36 dupes, 48 MB saved.
imsir0vic opened this issue · comments
Repository contains 36 files with colliding hashes with neighboring files.
I have converted filenames to not use any special characters and replaced spaces with hyphens, but it shouldn't be difficult to figure out which files need to go.
Approximately 47.60 MB can be saved if these duplicates are to be removed.
Note: I removed occurences where the 2 files were compared 2 times against each other, so remove the files under the file1
column.
file1 | file2 | md5_hash |
---|---|---|
a-fast-minimal-memory-consistent-hash-algorithm-1406-2294v1.pdf | a-fast-minimal-memory-consistent-hash-algorithm-1406-2294.pdf | 9413009b700c5da19fe84be2d8b88105 |
avoiding-avx-to-sse-transition-penalties.pdf | intel-avoiding-avx-sse-transition-penalties-11mc12-avoiding-2bavx-sse-2btransition-2bpenalties-2brh-2bfinal.pdf | 2822f961d0554beaedf314ccf6480b82 |
b-trees-shadowing-and-clones-2007.pdf | paper-b-trees-shadowing-and-clones.pdf | 59de4e7e8eddcd1d1cca00123d84b734 |
bitmap-graphics-and-bitblit-course-notes-siggraph-1984-pike84bitblt.pdf | bitmap-graphs-siggraph84-course-notes-pike84bitblt.pdf | d022a8252be7c36268c422d8d1a79c47 |
bitmap-graphics-and-bitblit-course-notes-siggraph-1984-pike84bitblt.pdf | why-bitblt-was-so-successful-siggraph-84-pike84bitblt.pdf | d022a8252be7c36268c422d8d1a79c47 |
bitmap-graphs-siggraph84-course-notes-pike84bitblt.pdf | bitmap-graphics-and-bitblit-course-notes-siggraph-1984-pike84bitblt.pdf | d022a8252be7c36268c422d8d1a79c47 |
cache-aware-lock-free-queues-for-multiple-producers-consumers-and-weak-memory-consistency-1.pdf | cache-aware-lock-free-queues-for-multiple-producers-consumers-and-weak-memory-consistency.pdf | ad27d5c17e8a6ebfc2d675a04e95302e |
cache-hash-and-space-efficient-bloom-filters-10-1-1-93-7688.pdf | cache-hash-and-space-efficient-bloom-filters.pdf | 0fd72fe9c03748ff676c162310464ca7 |
compiler-construction-niklaus-wirth-1996-cbeall.pdf | compiler-construction-niklaus-wirth-2005-cbeall.pdf | 534b16d00c0741423a3b13c6bf899ff2 |
cuda-practice.pdf | using-cuda-in-practice-gpu-programming-cse-591-slides.pdf | 402d2e859edd7cef753f22c0e248e9aa |
dec-the-mistakes-that-led-to-its-downfall-goodwin-paper.pdf | dec-the-mistakes-that-led-to-its-downfall.pdf | 5b8258bfebecf3c82c98ffcd86725a72 |
derivability-consistency-rj599.pdf | derivability-redundancy-and-consistency-of-relations-stored-in-large-data-banks-e-f-codd-1969.pdf | 22a4c45f4442d9eee64feb537ae9b0b1 |
disruptor-high-performance-alternative-to-bounded-queues-for-exchanging-data-between-concurrent-threads-may-2011.pdf | lmax-disruptor-high-performance-alternative-to-bounded-queues-for-exchanging-data-between-concurrent-threads-disruptor-1-0.pdf | 086c51e408a22a25d77c99092012a376 |
efficient-estimation-of-word-representations-in-vector-space-2013-1301-3781.pdf | efficient-estimation-of-word-representations-in-vector-space-7th-sep-2013-1301-3781.pdf | ae57979bd1115dacba35d86a916ccd6c |
fast-sorting-algorithms-using-avx-512-on-intel-knights-landing-1704-08579.pdf | fast-sorting-algorithms-using-avx-512-on-intel-knights-landing-24-apr-2017-1704-08579.pdf | 4d11f40d372a2c181501e3b10b99b6b4 |
heracles-improving-resource-efficiency-at-scale-2015-heracles-isca.pdf | heracles-improving-resource-efficiency-at-scale-2015.pdf | c298bca5fb1fdef3877edd5219c930b1 |
how-to-benchmark-code-execution-times-on-intel-ia-32-and-ia-64-instruction-set-architectures-september-2010-324264-001.pdf | intel-how-to-benchmark-code-execution-times-on-intel-ia-32-and-ia-64-instruction-set-architectures-2010.pdf | 51f6e904be2a90ba246e450add49a937 |
how-to-write-shared-libraries-v4-1-2-drepper-2001.pdf | paper-how-to-write-shared-libraries.pdf | cb1187e59db5697ffeb9f68d93c29628 |
index-internals-rebuilding-the-truth.pdf | oracle-b-tree-index-internals-rebuilding-the-truth-richard-foote.pdf | 09b5b823ad26dcecc3045832e325316f |
instant-loading-for-main-memory-databases-2013-p1702-muehlbauer.pdf | instant-loading-for-main-memory-databases-vldb-2013-vol-6-no-14-p1702-muehlbauer.pdf | 8113e284be2db9f9b5a75c505461491c |
intel-advanced-encryption-standard-aes-new-instructions-set-white-paper-rev-3-0-may-2010-323641-001.pdf | intel-advanced-encryption-standard-aes-new-instructions-set.pdf | 60fd816b720bb598e345bfa16fbdd303 |
intel-architecture-instruction-set-extensions-and-future-features-programming-reference-january-2018.pdf | intel-architecture-instruction-set-extensions-programming-reference-january-2018-319433-032.pdf | db82e04fe9c9239537f80e2253502448 |
intel-cache-allocation-technology-whitepaper-2015.pdf | intel-improving-real-time-performance-by-utilizing-cache-allocation-technology-whitepaper-april-2015.pdf | 8fdee2bf78cacef214231494a0db39fd |
kernel-debugging-with-windbg.pdf | windows-kernel-debugging-tutorial.pdf | fa1f22564ddb76d93c7a8c442221414d |
kernel-pool-exploitation-on-windows-7-16032-kernel-pool-exploitation-on-windows-7.pdf | kernel-pool-exploitation-on-windows-7-blackhat-dc-2011-mandt-kernelpool-wp.pdf | 070adc9e8040a0120fcbdfedd94ce5f6 |
mach-a-new-kernel-foundation-for-unix-developers-accetta86.pdf | mach-a-new-kernel-foundation-for-unix-developers-mach-usenix86.pdf | 8b12602235a15bf84607eb411a7ea036 |
nt-insider-2017-01.pdf | the-nt-insider-2017-01.pdf | aa27d9ef4e84e9480bdf709860f66e94 |
nvidia-geforce-gtx-1080-whitepaper-gaming-perfected.pdf | nvidia-geforce-gtx-1080-whitepaper.pdf | 44915ede2dfac43e660b93df51c85222 |
nvidia-optimizing-parallel-reduction-in-cuda-slides.pdf | optimizing-parallel-reduction-in-cuda-slides.pdf | cbd205adbd08c0034f2f095dff8f0cbf |
nvidia-understanding-and-using-atomic-memory-operations-slides-s3101-atomic-memory-operations.pdf | understanding-and-using-atomic-memory-operations-gtc-2013-slides-s3101-atomic-memory-operations.pdf | ddab1288d97e1ce87c3da823e1cd955c |
overview-of-rdma-on-windows.pdf | sc11-overview-of-rdma-on-windows.pdf | a85f92326be295392e78b9f5ac1aa926 |
pc-assembly-language-2006.pdf | pc-assembly-language-july-23-2006.pdf | 1b361498d0d1efb801a247c0699a28a1 |
regular-and-almost-universal-hashing-an-efficient-implementation-1609-09840.pdf | regular-and-almost-universal-hashing-an-efficient-implementation-2016-1609-09840.pdf | 7a31156b6ba7ca738087e70955f93813 |
stratified-b-trees-and-versioning-dictionaries-2011-1103-4282v2.pdf | stratified-b-trees-and-versioning-dictionaries-30-march-2011-1103-4282v2.pdf | 1f2aeff51757155533597bc1b8e4dc24 |
system-v-application-binary-interface-abi-amd64-architecture-processor-supplement-v0-99-6-october-7-2013.pdf | system-v-application-binary-interface-amd64-architecture-processor-supplement.pdf | 4aaf2d6d0ecbe8aac4fa03e870f63ca9 |
the-rfb-protocol-v3-0-26-nov-2010.pdf | the-rfb-protocol-v3-8-26-nov-2010.pdf | 4b2a8f76733a98d91e74c07a29ad261d |
towards-deep-symbolic-reinforcement-learning-2016-1609-05518.pdf | towards-deep-symbolic-reinforcement-learning-2016-1609-05518v2.pdf | 81ca673bc5e7bb818fabe37e8bf9ac8e |