Explore >> Select a destination


You are here

www.layer9.org
| | tashian.com
22.4 parsecs away

Travel
| | The story of a major hash table vulnerability, and how it took a decade to uncover and resolve.
| | attractivechaos.wordpress.com
21.1 parsecs away

Travel
| | TL;DR: With linear probing, we can delete elements from an open addressing hash table without tombstones. Here are the C and the C++ implementations. Introduction When implementing a hash table based on open addressing, we usually set a tombstone for each deleted element, which indicates a bucket used to have an element. These tombstones maintain...
| | algorithmsoup.wordpress.com
16.3 parsecs away

Travel
| | When people talk about "space-efficient hash tables'', they are usually talking about the following type of guarantee: If we are storing $latex n$ keys, each of which are $latex w$ bits, then the total space usage should be $latex (1 + \epsilon)wn$ bits for some small $latex \epsilon$. But, what if I told you we...
| | verdagon.dev
107.0 parsecs away

Travel
|