Figure 9From: Efficient hash tables for network applicationsReal and expected counter frequencies.Back to article page