Skip to search formSkip to main contentSkip to account menu

Toeplitz Hash Algorithm

Known as: Toeplitz, Toeplitz Hash 
The Toeplitz hash function is used in many network interface controllers for receive side scaling.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Based on a recently proposed Toeplitz matrix-vector product approach, a subquadratic computational complexity scheme is presented… 
2003
2003
Given a real or complex $n \times n$ matrix $A_n$, we compute the expected value and the variance of the random variable $\| A_n… 
Highly Cited
2001
Highly Cited
2001
For a nonstationary random process, the dual-time correlation function and the dual frequency Loeve spectrum are complete… 
Highly Cited
2001
Highly Cited
2001
Previous studies dealing with direction-of-arrival (DOA) estimation for uncorrelated planes waves incident on nonuniform M-sensor… 
Highly Cited
2000
Highly Cited
2000
This paper presents a novel means of computing the greatest common divisor (GCD) of two polynomials with real-valued coefficients… 
Highly Cited
1996
Highly Cited
1996
This paper is about the eigenvalues and eigenvectors of (/spl darr/2)H. The ordinary FIR filter H is a convolution with a vector… 
1996
1996
A method for the design of allpass filters is described. In this method, an error reflecting the difference between the desired… 
1991
1991
An enhanced version of a signal is obtained after subtraction of a linear combination of rank one matrices from the signal… 
Highly Cited
1987
Highly Cited
1987
This paper is concerned with the study of the invertibility properties of a certain class of operators which we call “skew… 
1975
1975
In the above correspondence,1 Ahmed et al. proposed a discrete cosine transform (DCT) and compared its performance with the…