4 papers
4 files
4 references

Papers Referenced in This Repository

Less hashing, same performance: Building a better Bloom filter

Adam Kirsch, Michael Mitzenmacher
2006
2 references

Abstract A standard technique from the hashing literature is to use two hash functions h 1 ( x ) and h 2 ( x ) to simulate additional hash functions of the form g i ( x ) = h 1 ( x ) + i h 2 ( x ). We demonstrate that this technique can be usefully applied to Bloom filters and related data structure...

Show 1 reference in code

Serializable isolation for snapshot databases

Michael J. Cahill, Uwe Röhm, Alan Fekete
2009
2 references

Many popular database management systems implement a multiversion concurrency control algorithm called snapshot isolation rather than providing full serializability based on locking. There are well-known anomalies permitted by snapshot isolation that can lead to violations of data consistency by int...

Show 1 reference in code

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation

Michael E. Kounavis, Frank L. Berry
2008
2 references

A framework for designing a family of novel fast cyclic redundancy code (CRC) generation algorithms is presented. Our algorithms can ideally read arbitrarily large amounts of data at a time, while optimizing their memory requirement to meet the constraints of specific computer architectures. In addi...

Show 1 reference in code
Link copied to clipboard!