The array hash table, array burst trie and array BST, written in C, as described in my PhD thesis.
☆45Nov 17, 2016Updated 9 years ago
Alternatives and similar repositories for Cache-Conscious-Data-Structures
Users that are interested in Cache-Conscious-Data-Structures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The HAT-trie, written in C, as described in my PhD thesis.☆21Nov 17, 2016Updated 9 years ago
- A compact implementation of Dr. Askitis HatTrie☆82May 20, 2014Updated 11 years ago
- A small fast isam/btree library for key/val access☆13Jul 10, 2010Updated 15 years ago
- a copy of m^2 's fsbench (https://chiselapp.com/user/Justin_be_my_guide/repository/fsbench/) with the latest density updates☆14Dec 30, 2019Updated 6 years ago
- ☆15Mar 2, 2011Updated 15 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Boost.org ptr_container module☆18Mar 11, 2026Updated 3 weeks ago
- Reactor polling pattern for ZeroMQ☆30Aug 27, 2010Updated 15 years ago
- ☆39Jun 20, 2020Updated 5 years ago
- A benchmark of some prominent C/C++ hash table implementations☆104Feb 27, 2019Updated 7 years ago
- HAMT implementation whose sub-trees can be shared over threads☆10Feb 9, 2026Updated 2 months ago
- Persistent Memory library for pure Java☆24Jan 19, 2026Updated 2 months ago
- An efficient trie implementation.☆255Nov 25, 2020Updated 5 years ago
- Addressing the problem of predicting crime occurrence based on historic records☆11Nov 27, 2019Updated 6 years ago
- fnv1 and fnv1a hash functions in ruby☆21Jul 17, 2011Updated 14 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- POC memory editor that uses the mach_vm kernel calls to scan, read, and write integer memory regions.☆12Aug 23, 2017Updated 8 years ago
- Just in Time Datastructures☆11Feb 21, 2017Updated 9 years ago
- Sir, is a tcp proxy that checks for regressions in your services/apps.☆12Mar 20, 2024Updated 2 years ago
- A Horcrux is a powerful object in which a Dark wizard or witch has hidden a fragment of his or her soul for the purpose of attaining immo…☆17Aug 17, 2017Updated 8 years ago
- Implements a Rust ordered map as a BurstTrie.☆30May 26, 2017Updated 8 years ago
- Toy benchmark comparing RocksDB and Sled☆13Aug 27, 2023Updated 2 years ago
- A modern implementation of protoc to serialize, deserialize and generate java sources from protobuf schemas☆47Apr 2, 2026Updated last week
- Cuckoo Hashtable C Library☆35Mar 6, 2020Updated 6 years ago
- Provides canary based prewarming of lambda functions for Kinesis Event Sources.☆15Oct 13, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- mongodb proxy☆13Oct 8, 2012Updated 13 years ago
- Leon Bottou's SGD☆34Oct 13, 2011Updated 14 years ago
- ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions (USENIX ATC'24)☆13Jun 20, 2024Updated last year
- ☆12Nov 21, 2016Updated 9 years ago
- Light Weight Event System C library☆29Feb 12, 2018Updated 8 years ago
- A dynamically safe implementation of C, using your existing C compiler. Tolerates idiomatic C code pretty well. Not perfect... yet.☆107Sep 11, 2024Updated last year
- Code for the indexed convolution☆16Mar 4, 2026Updated last month
- Key/Value database benchmark☆26Sep 28, 2019Updated 6 years ago
- Deep Convoluted Restricted Boltzmann Machine (Java)☆17May 31, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- single file C libraries☆40Jan 12, 2025Updated last year
- [mirror] A library for Journaled I/O☆19Oct 14, 2018Updated 7 years ago
- ☆12Jul 10, 2020Updated 5 years ago
- Ansi C Redis .rdb dump file analyzer☆24Oct 8, 2012Updated 13 years ago
- FNV hash collision generator☆12Mar 2, 2017Updated 9 years ago
- BESPOKV: Application-Tailored Flexible Key-Value Store for HPC☆12Aug 28, 2018Updated 7 years ago
- 0MQ virtual protocol drivers☆14Sep 22, 2011Updated 14 years ago