On perfect hashing of numbers with sparse digit representation via multiplication by a constant
@article{Monge2011OnPH, title={On perfect hashing of numbers with sparse digit representation via multiplication by a constant}, author={Maurizio Monge}, journal={Discret. Appl. Math.}, year={2011}, volume={159}, pages={1176-1179} }
References
SHOWING 1-10 OF 15 REFERENCES
The computational complexity of universal hashing
- Computer ScienceSTOC '90
- 1990
Lower bounds on the complexity of any implementation of Carter-Wegman universal hashing are given: quadratic AT/sup 2/ bound for VLSI implementation; Omega (log n) parallel time bound on a CREW PRAM; and exponential size for constant depth circuits.
Even strongly universal hashing is pretty fast
- Computer ScienceSODA '00
- 2000
An experimental study of strongly universal hashing is presented, including non-standard usage of the floating point co-processor. Gains of up to a factor 15 are obtained over naive implementations…
Time-space tradeoff lower bounds for integer multiplication and graphs of arithmetic functions
- Mathematics, Computer ScienceSTOC '03
- 2003
We prove exponential size lower bounds for nondeterministic and randomized read-k BPs as well as a time-space tradeoff lower bound for unrestricted, deterministic multi-way BPs computing the middle…
Efficient Strongly Universal and Optimally Universal Hashing
- Computer Science, MathematicsMFCS
- 1999
An optimally universal hash class is presented, which means that the universality parameter achieves the minimum possible value, and it is shown how to reduce the size of a known class, retaining its properties.
Tabulation based 4-universal hashing with applications to second moment estimation
- Computer Science, MathematicsSODA '04
- 2004
We show that 4-universal hashing can be implemented efficiently using tabulated 4-universal hashing for characters, gaining a factor of 5 in speed over the fastest existing methods. We also consider…
Symmetric functions and Hall polynomials
- Mathematics
- 1979
I. Symmetric functions II. Hall polynomials III. HallLittlewood symmetric functions IV. The characters of GLn over a finite field V. The Hecke ring of GLn over a finite field VI. Symmetric functions…
Avoiding Rotated Bitboards with Direct Lookup
- Computer ScienceJ. Int. Comput. Games Assoc.
- 2007
This paper describes an approach for obtaining direct access to the attacked squares of sliding pieces without resorting to rotated bitboards by creating four hash tables using the built in hash arrays from an interpreted, high level language.
The Lonely Runner with Seven Runners
- MathematicsElectron. J. Comb.
- 2008
A new tool developed in this context is used to solve the first open case of the lonely runner conjecture with seven runners and is related to the regular chromatic number of distance graphs.
The symmetric group - representations, combinatorial algorithms, and symmetric functions
- MathematicsWadsworth & Brooks / Cole mathematics series
- 1991
Group Representations.- Representations of the Symmetric Group.- Combinatorial Algorithms.- Symmetric Functions.- Applications and Generalizations.