Skip to search formSkip to main contentSkip to account menu

Toeplitz Hash Algorithm

Known as: Toeplitz, Toeplitz Hash 
The Toeplitz hash function is used in many network interface controllers for receive side scaling.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
The MRI image reconstruction supported by Toeplitz-based iterative super-resolution algorithm is presented in the paper. It is… 
2007
2007
We prove two-weight norm inequalities for Calderón-Zygmund singular integrals that are sharp for the Hilbert transform and for… 
2006
2006
  • G. RajanB. Rajan
  • 2006
  • Corpus ID: 15694127
This is the second part of a two-part series of papers. In this paper, for the generalized non-orthogonal amplify and forward… 
2002
2002
We consider problems related to the generalization of the classical Fourier basis to a basis of rational functions with… 
Highly Cited
2001
Highly Cited
2001
Previous studies dealing with direction-of-arrival (DOA) estimation for uncorrelated planes waves incident on nonuniform M-sensor… 
2000
2000
Representations for inverses of real symmetric Toeplitz matrices involving discrete Hartley transformations are presented which… 
1989
1989
A highly parallel algorithm is presented for the Hermitian Toeplitz eigenproblem. It computes recursively, in increasing order… 
1989
1989
The bowtie factorization of a Toeplitz correlation matrix R and its inverse is introduced. The term bowtie describes the pattern… 
1987
1987
Let $\mathcal{B}_{n,h,k} $ be the class of $n \times n$ band Toeplitz matrices $A = (a_{i,j} )$ such that $a_{i,j} = 0$ if $i - j… 
1975
1975
In the above correspondence,1 Ahmed et al. proposed a discrete cosine transform (DCT) and compared its performance with the…