Linux Kernel Hash Table Behavior: Analysis and Improvements
dc.contributor.author | Lever, Chuck | en_US |
dc.date.accessioned | 2014-07-18T18:11:52Z | |
dc.date.available | 2014-07-18T18:11:52Z | |
dc.date.issued | 2000-08-13 | en_US |
dc.identifier.citation | Chuck Lever, "Linux Kernel Hash Table Behavior: analysis and improvements," Netscape Communications Corp., February 2000. <http://hdl.handle.net/2027.42/107902> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107902 | |
dc.description.abstract | The Linux kernel employs hash table data structures to store high-usage data objects such as pages, buffers, inodes, and others. In this report we find significant performance boosts with careful analysis and tuning of four critical kernel data structures. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Linux Kernel Hash Table Behavior: Analysis and Improvements | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationother | Sun-Netscape Alliance | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107902/1/citi-tr-00-1.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.