Tagged articles
8 articles
Page 1 of 1
NiuNiu MaTe
NiuNiu MaTe
Sep 1, 2025 · Backend Development

How Does Java’s HashMap Resolve Hash Collisions? From Linked Lists to Red‑Black Trees

Java’s HashMap tackles hash collisions through a combination of perturbation functions, chaining, open addressing, and, since JDK 8, converting long chains into red‑black trees, with detailed explanations of the underlying algorithms, resizing mechanics, threshold choices, and performance trade‑offs for developers and interview candidates.

Hash CollisionHashMapJava
0 likes · 17 min read
How Does Java’s HashMap Resolve Hash Collisions? From Linked Lists to Red‑Black Trees
Baidu Geek Talk
Baidu Geek Talk
Jul 10, 2024 · Artificial Intelligence

Baidu HPN Network: Solving Hash Collision for 95% Physical Network Bandwidth Efficiency in Large Model Training

Baidu's HPN network solves hash‑collision bottlenecks in large‑model training by combining TOR‑affinity scheduling with Dynamic Load Balancing on self‑developed switches, boosting physical network bandwidth efficiency to about 95%, improving throughput by roughly 10% and adding a further 1.5% training‑speed gain via the BCCL library.

Baidu CloudDLB Dynamic Load BalancingHPN Network
0 likes · 12 min read
Baidu HPN Network: Solving Hash Collision for 95% Physical Network Bandwidth Efficiency in Large Model Training
Baidu Intelligent Cloud Tech Hub
Baidu Intelligent Cloud Tech Hub
Jul 3, 2024 · Operations

How to Eliminate Network Hash Collisions in Large‑Model Training

This article examines the impact of GPU communication bottlenecks on large‑model training, analyzes hash‑collision issues in high‑performance networks, and presents three practical solutions—including increasing RDMA streams, affinity‑aware scheduling, and dynamic load balancing—to boost effective network bandwidth up to 95%.

Hash CollisionRDMAdynamic load balancing
0 likes · 11 min read
How to Eliminate Network Hash Collisions in Large‑Model Training
Laravel Tech Community
Laravel Tech Community
Apr 12, 2022 · Information Security

Common PHP Weak‑Type Vulnerabilities: MD5 Collision, is_numeric, in_array, switch, and intval Issues

This article explains several PHP weak‑type pitfalls—including MD5 hash collisions, improper handling by is_numeric, unexpected behavior of in_array and switch, and intval casting quirks—showing how they can lead to security problems such as hash collisions, SQL injection, and logic errors.

Hash CollisionPHPWeak Typing
0 likes · 4 min read
Common PHP Weak‑Type Vulnerabilities: MD5 Collision, is_numeric, in_array, switch, and intval Issues
macrozheng
macrozheng
Apr 29, 2020 · Fundamentals

Mastering Java HashMap: From Basics to Interview Mastery

This article explains the fundamentals of Java's HashMap, covering its relationship to Set and Map families, internal implementation details, hashCode/equals contracts, collision resolution strategies, basic operations with code examples, and common interview questions such as Top‑K and LRU cache design.

Data StructuresHash CollisionHashMap
0 likes · 18 min read
Mastering Java HashMap: From Basics to Interview Mastery
21CTO
21CTO
May 17, 2019 · Information Security

Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End

A recent $100k research effort demonstrated a prefix collision attack on SHA-1, proving that attackers can forge signed documents and TLS certificates, and highlighting why the cryptographic community must retire SHA-1 in favor of stronger hash algorithms.

Hash CollisionSHA-1cryptography
0 likes · 6 min read
Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End