• Thumbnail for Hash table
    In computing, a hash table, also known as a hash map or a hash set, is a data structure that implements an associative array, also called a dictionary...
    54 KB (5,928 words) - 09:52, 17 April 2024
  • Thumbnail for Distributed hash table
    A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
    35 KB (4,106 words) - 09:15, 23 April 2024
  • Thumbnail for Hash function
    a hash function are called hash values, hash codes, hash digests, digests, or simply hashes. The values are usually used to index a fixed-size table called...
    48 KB (7,839 words) - 10:16, 17 April 2024
  • Thumbnail for Cuckoo hashing
    Cuckoo hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table, with worst-case constant lookup...
    23 KB (2,557 words) - 02:00, 13 February 2024
  • Thumbnail for Hash collision
    computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
    12 KB (1,456 words) - 23:04, 28 February 2024
  • Associative array (redirect from Hash array)
    associative arrays. The two major solutions to the dictionary problem are hash tables and search trees. It is sometimes also possible to solve the problem...
    24 KB (2,773 words) - 16:56, 4 April 2024
  • A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically...
    24 KB (3,456 words) - 20:43, 21 April 2024
  • Thumbnail for Concurrent hash table
    concurrent hash table or concurrent hash map is an implementation of hash tables allowing concurrent access by multiple threads using a hash function....
    16 KB (1,777 words) - 20:23, 22 March 2024
  • building hash tables from the tuples of one or both of the joined relations, and subsequently probing those tables so that only tuples with the same hash code...
    8 KB (1,173 words) - 20:43, 17 January 2024
  • Thumbnail for Perfect hash function
    Perfect hash functions may be used to implement a lookup table with constant worst-case access time. A perfect hash function can, as any hash function...
    24 KB (2,956 words) - 07:36, 14 December 2023
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    45 KB (6,067 words) - 11:48, 27 April 2024
  • In computer science, consistent hashing is a special kind of hashing technique such that when a hash table is resized, only n / m {\displaystyle n/m} keys...
    22 KB (2,559 words) - 19:24, 8 April 2024
  • Thumbnail for Page table
    this is where the collision chain is used. This hash table is known as a hash anchor table. The hashing function is not generally optimized for coverage...
    17 KB (2,462 words) - 05:36, 5 January 2024
  • k{\displaystyle k}, a hash table would store the value v{\displaystyle v} in the slot h(k){\displaystyle h(k)} where h{\displaystyle h} is a hash function i.e...
    22 KB (3,016 words) - 20:56, 22 February 2024
  • Thumbnail for Open addressing
    Open addressing, or closed hashing, is a method of collision resolution in hash tables. With this method a hash collision is resolved by probing, or searching...
    8 KB (1,044 words) - 14:32, 8 December 2023
  • Look up hash in Wiktionary, the free dictionary. Hash, hashes, hash mark, or hashing may refer to: Hash (food), a coarse mixture of ingredients Hash (stew)...
    2 KB (271 words) - 18:23, 19 July 2023
  • Thumbnail for Linear probing
    Linear probing (category Hashing)
    probing is a scheme in computer programming for resolving collisions in hash tables, data structures for maintaining a collection of key–value pairs and...
    28 KB (3,593 words) - 14:27, 16 February 2024
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
    15 KB (1,779 words) - 13:43, 22 April 2024
  • response to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011. SipHash is designed as a non-cryptographic hash function. Although...
    13 KB (1,282 words) - 11:01, 28 February 2024
  • FNV offset basis yield the following table of FNV hash parameters: The FNV hash was designed for fast hash table and checksum use, not cryptography. The...
    14 KB (1,410 words) - 09:11, 25 March 2024
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
    3 KB (464 words) - 03:57, 19 March 2024
  • Thumbnail for Trie
    the total number of nodes within the table. Tries do not need a hash function for the operation, unlike a hash table; there are also no collisions of different...
    31 KB (3,395 words) - 11:44, 19 January 2024
  • In computer science, locality-sensitive hashing (LSH) is a fuzzy hashing technique that hashes similar input items into the same "buckets" with high probability...
    30 KB (4,030 words) - 08:15, 28 April 2024
  • A hash array mapped trie (HAMT) is an implementation of an associative array that combines the characteristics of a hash table and an array mapped trie...
    6 KB (613 words) - 18:59, 2 April 2023
  • Distributed hash table Double hashing Dynamic perfect hash table Hash array mapped trie Hash list Hash table Hash tree Hash trie Koorde Prefix hash tree Rolling...
    9 KB (911 words) - 14:48, 5 March 2024
  • Double hashing is a computer programming technique used in conjunction with open addressing in hash tables to resolve hash collisions, by using a secondary...
    9 KB (1,493 words) - 16:33, 7 February 2024
  • file, and/or achieves a similar result through the use of distributed hash tables. Then the client connects directly to the peers in order to request pieces...
    18 KB (2,303 words) - 03:22, 13 April 2024
  • a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores key-value pairs by assigning keys to different computers...
    17 KB (2,496 words) - 23:35, 24 July 2023
  • own hash table. FKS hashing requires that if collisions occur they must do so only on the top level. The top level contains a randomly created hash function...
    3 KB (438 words) - 00:07, 19 November 2023
  • perfect hashing is a programming technique for resolving collisions in a hash table data structure. While more memory-intensive than its hash table counterparts...
    13 KB (1,589 words) - 11:04, 16 May 2023