Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,218,376 papers from all fields of science
Search
Sign In
Create Free Account
Hash table
Known as:
Hashtable
, Rehash
, Hash table collisions
Expand
In computing, a hash table (hash map) is a data structure used to implement an associative array, a structure that can map keys to values. A hash…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstraction (software engineering)
Adjacency list
Amortized analysis
Andrey Ershov
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Use of a novel hash-table for speeding-up suggestions for misspelt Tamil words
Ratnasingam Sakuntharaj
,
S. Mahesan
International Conference on Industrial and…
2017
Corpus ID: 3484345
Spell checker is a tool that finds and corrects misspelt words in a text document. Spelling error detection and correction…
Expand
Review
2013
Review
2013
Named data networking on a router: Fast and DoS-resistant forwarding with hash tables
W. So
,
A. Narayanan
,
D. Oran
Symposium on Architectures for Networking and…
2013
Corpus ID: 715060
Named data networking (NDN) is a new networking paradigm using named data instead of named hosts for communication…
Expand
Highly Cited
2011
Highly Cited
2011
Design and evaluation of main memory hash join algorithms for multi-core CPUs
Spyros Blanas
,
Yinan Li
,
J. Patel
ACM SIGMOD Conference
2011
Corpus ID: 7280405
The focus of this paper is on investigating efficient hash join algorithms for modern multi-core processors in main memory…
Expand
Highly Cited
2011
Highly Cited
2011
Complementary hashing for approximate nearest neighbor search
Hao Xu
,
Jingdong Wang
,
Zhu Li
,
Gang Zeng
,
Shipeng Li
,
Nenghai Yu
Vision
2011
Corpus ID: 17003189
Recently, hashing based Approximate Nearest Neighbor (ANN) techniques have been attracting lots of attention in computer vision…
Expand
Highly Cited
2008
Highly Cited
2008
ARQ for network coding
J. Sundararajan
,
Devavrat Shah
,
M. Médard
IEEE International Symposium on Information…
2008
Corpus ID: 345350
A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The…
Expand
Highly Cited
2005
Highly Cited
2005
Guest editorial
David K. Ding
,
Julie Harrison
Metabolic brain disease
2005
Corpus ID: 1254885
Since COVID-19 has important social and economic impacts, there is a need for organisations, including businesses, the public…
Expand
Highly Cited
2004
Highly Cited
2004
Constraining dynamic TOPMODEL responses for imprecise water table information using fuzzy rule based performance measures
J. Freer
,
H. McMillan
,
J. McDonnell
,
K. Beven
2004
Corpus ID: 38718256
Highly Cited
2004
Highly Cited
2004
A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF
Chonggang Wang
,
Bo Li
,
Le Min Li
IEEE Transactions on Vehicular Technology
2004
Corpus ID: 14478808
The medium-access control (MAC) protocol is one of the key components in wireless local area networks (WLANs). The main features…
Expand
Highly Cited
2003
Highly Cited
2003
Space Efficient Hash Tables with Worst Case Constant Access Time
Dimitris Fotakis
,
R. Pagh
,
P. Sanders
,
P. Spirakis
Theory of Computing Systems
2003
Corpus ID: 2648215
Abstract We generalize Cuckoo Hashing to d-ary Cuckoo Hashing and show how this yields a simple hash table data structure that…
Expand
Highly Cited
2001
Highly Cited
2001
It knows what you're going to do: adding anticipation to a Quakebot
J. Laird
International Conference on Autonomous Agents
2001
Corpus ID: 3509100
The complexity of AI characters in computer games is continually improving; however they still fall short of human players. In…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE