Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,000,416 papers from all fields of science
Search
Sign In
Create Free Account
Hash table
Known as:
Hashtable
, Rehash
, Hash table collisions
Expand
In computing, a hash table (hash map) is a data structure used to implement an associative array, a structure that can map keys to values. A hash…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstraction (software engineering)
Adjacency list
Amortized analysis
Andrey Ershov
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
StreamMR: An Optimized MapReduce Framework for AMD GPUs
Marwa K. Elteir
,
Heshan Lin
,
Wu-chun Feng
,
T. Scogland
IEEE 17th International Conference on Parallel…
2011
Corpus ID: 1081153
MapReduce is a programming model from Google that facilitates parallel processing on a cluster of thousands of commodity…
Expand
Highly Cited
2010
Highly Cited
2010
Robust iris indexing scheme using geometric hashing of SIFT keypoints
H. Mehrotra
,
B. Majhi
,
Phalguni Gupta
Journal of Network and Computer Applications
2010
Corpus ID: 23613157
2006
2006
A novel approach to detecting DDoS Attacks at an Early Stage
Bin Xiao
,
Wei Chen
,
Yanxiang He
Journal of Supercomputing
2006
Corpus ID: 13916780
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to Internet security. Most current research focuses on…
Expand
Highly Cited
2005
Highly Cited
2005
Using visual cues for extraction of tabular data from arbitrary HTML documents
Bernhard Krüpl
,
M. Herzog
,
Wolfgang Gatterbauer
The Web Conference
2005
Corpus ID: 6574692
We describe a method to extract tabular data from web pages. Rather than just analyzing the DOM tree, we also exploit visual cues…
Expand
Highly Cited
2005
Highly Cited
2005
Hammers and Saws for the Improvement of Educational Research.
M. Eisenhart
2005
Corpus ID: 55214052
This article examines different conceptions of causation and their implications for understanding educational phenomena and…
Expand
Review
2002
Review
2002
Inventory Management using Passive RFID Tags : A Survey
Cherian Abraham
,
V. Ahuja
,
Arnab Ghosh
,
Praveen Pakanati
2002
Corpus ID: 15251329
Radio Frequency Identification (RFID) systems have emerged as an affordable solution for object identification. They are a cheap…
Expand
Highly Cited
2002
Highly Cited
2002
Mining association rules using inverted hashing and pruning
John D. Holt
,
S. M. Chung
Information Processing Letters
2002
Corpus ID: 43265256
Highly Cited
2000
Highly Cited
2000
Collision avoidance and resolution multiple access for multichannel wireless networks
R. Garcés
,
J. Garcia-Luna-Aceves
Proceedings IEEE INFOCOM . Conference on Computer…
2000
Corpus ID: 6888586
We introduce and analyze CARMA-MC (for collision avoidance and resolution multiple access for multiple channels), a new stable…
Expand
Highly Cited
1990
Highly Cited
1990
A Semi-Functional Implementation of a Higher-Order Logic Programming Language
Conal Elliott
,
F. Pfenning
1990
Corpus ID: 54154214
In this chapter we develop an interpreter of a higher-order constraint logic programming language in Standard ML (SML). The logic…
Expand
1977
1977
A Summary of the PSI Program Synthesis System
C. Green
International Joint Conference on Artificial…
1977
Corpus ID: 26263841
This paper describes the current status of the PSI program synthesis system. It allows program specification dialogues using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE