The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
Communications of the ACM - Special 25th Anniversary Issue
Programming Technique: An improved hash code for scatter storage
Communications of the ACM
A variant method of file searching
Communications of the ACM
An indirect chaining method for addressing on secondary keys
Communications of the ACM
Journal of the ACM (JACM)
More analysis of double hashing
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Fast hashing of variable-length text strings
Communications of the ACM
The analysis of closed hashing under limited randomness
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
A compendium of key search references
ACM SIGIR Forum
The Analysis of Hashing Techniques That Exhibit k-ary Clustering
Journal of the ACM (JACM)
ACM Computing Surveys (CSUR)
Performance analysis of three related assignment problems
SIGMOD '79 Proceedings of the 1979 ACM SIGMOD international conference on Management of data
External hasing with limited internal storage
PODS '82 Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems
The analysis of double hashing(Extended Abstract)
STOC '76 Proceedings of the eighth annual ACM symposium on Theory of computing
Information Sciences: an International Journal
Hi-index | 0.03 |