2016
DOI: 10.1109/tc.2015.2417524
|View full text |Cite
|
Sign up to set email alerts
|

Parallel d-Pipeline: A Cuckoo Hashing Implementation for Increased Throughput

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 17 publications
0
18
0
Order By: Relevance
“…In this section, we give a brief overview of these protocols. [18], k-anonymity [19], and cuckoo filter [11] are three techniques that can be used to protect the privacy of SUs. Gao et al [20] proposed a PIR-based protocol, in which SUs can obtain available spectrum information from the DB without sending geographic location information.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we give a brief overview of these protocols. [18], k-anonymity [19], and cuckoo filter [11] are three techniques that can be used to protect the privacy of SUs. Gao et al [20] proposed a PIR-based protocol, in which SUs can obtain available spectrum information from the DB without sending geographic location information.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is urgent to protect the location privacy of the SU during the spectrum query in CRNs. Some protocols based on private information retrieval (PIR) [11,12] or kanonymity [13,14] have been proposed to protect the location privacy of SUs. However, these protocols might cause high computation or communication overheads or cannot provide enough safeguards for location privacy of SUs.…”
Section: Introductionmentioning
confidence: 99%
“…The single-table and d-table alternatives provide the same asymptotic performance in terms of memory utilization. When each subtable is placed on a different memory device this enables a parallel search operation that can be completed in one memory access cycle [20]. However, as discussed in the introduction, this is not desirable for external memories, as supporting several external memory interfaces requires increasing the number of pins and memory controllers.…”
Section: Insertionmentioning
confidence: 99%
“…The most direct implementation is to store the d hash tables in a single memory [16]. Another option is to have d memories such that each table is stored in a different memory and all the memories are accessed in parallel [17]. For the case of a single memory, accesses can be sequential or concurrent depending on the implementation.…”
Section: Cuckoo Hashingmentioning
confidence: 99%