Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,572,437 papers from all fields of science
Search
Sign In
Create Free Account
Toeplitz Hash Algorithm
Known as:
Toeplitz
, Toeplitz Hash
The Toeplitz hash function is used in many network interface controllers for receive side scaling.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Network interface controller
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
An information-theoretic framework for deriving canonical decision-feedback receivers in Gaussian channels
T. Guess
,
M. Varanasi
IEEE Transactions on Information Theory
2005
Corpus ID: 6553460
A framework is presented that allows a number of known results relating feedback equalization, linear prediction, and mutual…
Expand
2003
2003
The Norm of the Product of a Large Matrix and a Random Vector
A. Böttcher
,
S. Grudsky
2003
Corpus ID: 15740783
Given a real or complex $n \times n$ matrix $A_n$, we compute the expected value and the variance of the random variable $\| A_n…
Expand
Highly Cited
2002
Highly Cited
2002
Structured residual vector-based approach to sensor fault detection and isolation
Weihua Li
,
Sirish L. Shah
2002
Corpus ID: 59441112
Highly Cited
2001
Highly Cited
2001
Toeplitz and Hankel kernels for estimating time-varying spectra of discrete-time random processes
L. Scharf
,
B. Friedlander
IEEE Transactions on Signal Processing
2001
Corpus ID: 5916710
For a nonstationary random process, the dual-time correlation function and the dual frequency Loeve spectrum are complete…
Expand
Highly Cited
2000
Highly Cited
2000
QR-factorization method for computing the greatest common divisor of polynomials with inexact coefficients
C. Zarowski
,
Xiaoyan Ma
,
F. Fairman
IEEE Transactions on Signal Processing
2000
Corpus ID: 13175921
This paper presents a novel means of computing the greatest common divisor (GCD) of two polynomials with real-valued coefficients…
Expand
Highly Cited
1996
Highly Cited
1996
Eigenvalues of (↓2)H and convergence of the cascade algorithm
G. Strang
IEEE Transactions on Signal Processing
1996
Corpus ID: 20871877
This paper is about the eigenvalues and eigenvectors of (/spl darr/2)H. The ordinary FIR filter H is a convolution with a vector…
Expand
1996
1996
Weighted least-squares design of recursive allpass filters
S. Kidambi
IEEE Transactions on Signal Processing
1996
Corpus ID: 9931273
A method for the design of allpass filters is described. In this method, an error reflecting the difference between the desired…
Expand
1992
1992
Toeplitz sequences, paperfolding, towers of Hanoi and progression-free sequence of integers
J. Allouche
,
R. Bacher
1992
Corpus ID: 126724750
Highly Cited
1987
Highly Cited
1987
On skew Toeplitz operations, I
H. Bercovici
,
C. Foiaş
,
A. Tannenbaum
IEEE Conference on Decision and Control
1987
Corpus ID: 31120138
This paper is concerned with the study of the invertibility properties of a certain class of operators which we call “skew…
Expand
1975
1975
Comments on "Discrete Cosine Transform"
K. Shanmugam
IEEE Trans. Computers
1975
Corpus ID: 29549118
In the above correspondence,1 Ahmed et al. proposed a discrete cosine transform (DCT) and compared its performance with the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required