• Thumbnail for Concurrent hash table
    A concurrent hash table or concurrent hash map is an implementation of hash tables allowing concurrent access by multiple threads using a hash function...
    16 KB (1,792 words) - 01:25, 8 April 2025
  • Thumbnail for Hash table
    data type that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots...
    54 KB (6,112 words) - 03:09, 2 August 2025
  • Ctrie (redirect from Concurrent hash-trie)
    A concurrent hash-trie or Ctrie is a concurrent thread-safe lock-free implementation of a hash array mapped trie. It is used to implement the concurrent...
    17 KB (1,953 words) - 20:32, 19 December 2024
  • A hash array mapped trie (HAMT, /ˈhæmt/) is an implementation of an associative array that combines the characteristics of a hash table and an array mapped...
    6 KB (616 words) - 16:20, 20 June 2025
  • Thumbnail for Hopscotch hashing
    addressing. It is also well suited for implementing a concurrent hash table. Hopscotch hashing was introduced by Maurice Herlihy, Nir Shavit and Moran...
    7 KB (928 words) - 14:47, 18 December 2024
  • Thumbnail for Distributed hash table
    A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
    36 KB (4,182 words) - 01:23, 10 June 2025
  • Thumbnail for Cuckoo hashing
    Cuckoo hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table, with worst-case constant lookup...
    23 KB (2,591 words) - 09:19, 30 April 2025
  • Content-addressable network (category Hash-based data structures)
    provides hash table functionality on an Internet-like scale. CAN was one of the original four distributed hash table proposals, introduced concurrently with...
    6 KB (806 words) - 11:47, 3 July 2023
  • In computer science, consistent hashing is a special kind of hashing technique such that when a hash table is resized, only n / m {\displaystyle n/m} keys...
    22 KB (2,597 words) - 01:56, 26 May 2025
  • Thumbnail for Data structure
    indexes for data retrieval, while compiler implementations usually use hash tables to look up identifiers. Data structures provide a means to manage large...
    16 KB (1,805 words) - 15:49, 31 July 2025
  • the java.util.concurrent.ConcurrentHashMap implements java.util.concurrent.ConcurrentMap. The mechanism is a hash access to a hash table with lists of...
    26 KB (3,133 words) - 08:25, 30 April 2024
  • Thumbnail for Java collections framework
    of an array. HashMap uses a hash table. The hashes of the keys are used to find the elements in various buckets. The HashMap is a hash-based collection...
    43 KB (4,277 words) - 07:37, 25 June 2025
  • Linear hashing (LH) is a dynamic data structure which implements a hash table and grows or shrinks one bucket at a time. It was invented by Witold Litwin...
    13 KB (1,732 words) - 18:05, 5 June 2025
  • Mainline DHT is the name given to the Kademlia-based distributed hash table (DHT) used by BitTorrent clients to find peers via the BitTorrent protocol...
    8 KB (1,127 words) - 06:43, 23 April 2025
  • Database index (redirect from Table index)
    layout in the tables that are parts of the cluster. A cluster can be keyed with a B-tree index or a hash table. The data block where the table record is stored...
    17 KB (2,464 words) - 18:58, 7 June 2025
  • implemented using copy-on-write techniques. The usual concurrent map implementation in Java, ConcurrentHashMap, is not persistent, however. Fully persistent...
    42 KB (6,201 words) - 07:10, 21 June 2025
  • Thumbnail for Radix tree
    operation. Hash tables are commonly said to have expected O(1) insertion and deletion times, but this is only true when considering computation of the hash of...
    18 KB (2,329 words) - 13:23, 3 August 2025
  • Thumbnail for Quotient filter
    Quotient filter (category Hashing)
    concurrent updates, and adds support for associating a variable-sized counter to each element. The quotient filter is based on a kind of hash table in...
    20 KB (2,664 words) - 05:02, 27 December 2023
  • BitTorrent client introduced distributed tracking using distributed hash tables which allowed clients to exchange data on swarms directly without the...
    87 KB (8,961 words) - 07:14, 20 July 2025
  • weak tracking features. For instance, weak hash tables are useful. Like a regular hash table, a weak hash table maintains an association between pairs of...
    37 KB (5,282 words) - 03:36, 2 April 2025
  • has not been deleted from the list High Performance Dynamic Lock-Free Hash Tables and List-Based Sets, Maged M. Michael Fomitchev, Mikhail; Ruppert, Eric...
    7 KB (826 words) - 07:38, 7 May 2024
  • Read-copy-update (category Concurrency control)
    threads concurrently read and update elements that are linked through pointers and that belong to shared data structures (e.g., linked lists, trees, hash tables)...
    43 KB (5,080 words) - 00:54, 6 June 2025
  • administrator Data scientist Data structure Data type Associative array and Hash table Array List Tree String Matrix (computer science) Database Imperative...
    11 KB (1,036 words) - 19:01, 2 June 2025
  • circular queue clique clique problem clustering (see hash table) clustering free coalesced hashing coarsening cocktail shaker sort codeword coding tree...
    35 KB (3,135 words) - 18:46, 6 May 2025
  • Software transactional memory (category Concurrency control)
    a hash table with thread-safe insert and delete operations. Now suppose that we want to delete one item A from table t1, and insert it into table t2;...
    17 KB (2,117 words) - 05:21, 30 June 2025
  • example, in class HASH_TABLE [G, KEY -> HASHABLE] a derivation HASH_TABLE [INTEGER, STRING] is valid only if STRING inherits from HASHABLE (as it indeed does...
    49 KB (6,083 words) - 04:24, 29 July 2025
  • Critical section (category Concurrency control)
    In concurrent programming, concurrent accesses to shared resources can lead to unexpected or erroneous behavior. Thus, the parts of the program where the...
    12 KB (1,607 words) - 13:58, 5 June 2025
  • Thumbnail for Memory management unit
    share the same hash table. The 52-bit address is hashed, then used as an index into the off-chip table. There, a group of eight-page table entries is scanned...
    49 KB (7,099 words) - 18:50, 8 May 2025
  • Thumbnail for Multi-core network packet steering
    indirection table indexed by the last bits of the result provided by a hash function, taking as inputs the header fields of the packets. The hash function...
    18 KB (1,751 words) - 02:00, 1 August 2025
  • created a new database, unencumbered by any AT&T patents: an on-disk hash table that outperformed the existing dbm libraries. Berkeley DB itself was first...
    17 KB (1,566 words) - 08:37, 21 June 2025