Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,238,889 papers from all fields of science
Search
Sign In
Create Free Account
Toeplitz Hash Algorithm
Known as:
Toeplitz
, Toeplitz Hash
The Toeplitz hash function is used in many network interface controllers for receive side scaling.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Network interface controller
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases
H. Fan
,
M. A. Hasan
IEEE transactions on computers
2007
Corpus ID: 10372592
Based on a recently proposed Toeplitz matrix-vector product approach, a subquadratic computational complexity scheme is presented…
Expand
2003
2003
The Norm of the Product of a Large Matrix and a Random Vector
A. Böttcher
,
S. Grudsky
2003
Corpus ID: 15740783
Given a real or complex $n \times n$ matrix $A_n$, we compute the expected value and the variance of the random variable $\| A_n…
Expand
Highly Cited
2001
Highly Cited
2001
Toeplitz and Hankel kernels for estimating time-varying spectra of discrete-time random processes
L. Scharf
,
B. Friedlander
IEEE Transactions on Signal Processing
2001
Corpus ID: 5916710
For a nonstationary random process, the dual-time correlation function and the dual frequency Loeve spectrum are complete…
Expand
Highly Cited
2001
Highly Cited
2001
Detection-estimation of more uncorrelated Gaussian sources than sensors in nonuniform linear antenna arrays. II. Partially augmentable arrays
Y. Abramovich
,
N. Spencer
,
A. Gorokhov
IEEE Transactions on Signal Processing
2001
Corpus ID: 42664028
Previous studies dealing with direction-of-arrival (DOA) estimation for uncorrelated planes waves incident on nonuniform M-sensor…
Expand
Highly Cited
2000
Highly Cited
2000
QR-factorization method for computing the greatest common divisor of polynomials with inexact coefficients
C. Zarowski
,
Xiaoyan Ma
,
F. Fairman
IEEE Transactions on Signal Processing
2000
Corpus ID: 13175921
This paper presents a novel means of computing the greatest common divisor (GCD) of two polynomials with real-valued coefficients…
Expand
Highly Cited
1996
Highly Cited
1996
Eigenvalues of (↓2)H and convergence of the cascade algorithm
G. Strang
IEEE Transactions on Signal Processing
1996
Corpus ID: 20871877
This paper is about the eigenvalues and eigenvectors of (/spl darr/2)H. The ordinary FIR filter H is a convolution with a vector…
Expand
1996
1996
Weighted least-squares design of recursive allpass filters
S. Kidambi
IEEE Transactions on Signal Processing
1996
Corpus ID: 9931273
A method for the design of allpass filters is described. In this method, an error reflecting the difference between the desired…
Expand
1991
1991
Physical interpretation of signal reconstruction from reduced rank matrices
I. Dologlou
,
G. Carayannis
IEEE Transactions on Signal Processing
1991
Corpus ID: 35234652
An enhanced version of a signal is obtained after subtraction of a linear combination of rank one matrices from the signal…
Expand
Highly Cited
1987
Highly Cited
1987
On skew Toeplitz operations, I
H. Bercovici
,
C. Foiaş
,
A. Tannenbaum
IEEE Conference on Decision and Control
1987
Corpus ID: 31120138
This paper is concerned with the study of the invertibility properties of a certain class of operators which we call “skew…
Expand
1975
1975
Comments on "Discrete Cosine Transform"
K. Shanmugam
IEEE Trans. Computers
1975
Corpus ID: 29549118
In the above correspondence,1 Ahmed et al. proposed a discrete cosine transform (DCT) and compared its performance with the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE