The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
Addressing for Random-Access Storage with Multiple Bucket Capacities
Journal of the ACM (JACM)
A Note on the Efficiency of Hashing Functions
Journal of the ACM (JACM)
ACM Computing Surveys (CSUR)
Identifier Search Mechanisms: A Survey and Generalized Model
ACM Computing Surveys (CSUR)
Binary Search Trees and File Organization
ACM Computing Surveys (CSUR)
An improved hash code for scatter storage
Communications of the ACM - Special 25th Anniversary Issue
Quadratic search for hash tables of sizes P n
Communications of the ACM
Weighted increment linear search for scatter tables
Communications of the ACM
The reallocation of hash-coded tables
Communications of the ACM
Reducing the retrieval time of scatter storage techniques
Communications of the ACM
The use of quadratic residue research
Communications of the ACM
The quadratic quotient method: a hash code eliminating secondary clustering
Communications of the ACM
General performance analysis of key-to-address transformation methods using an abstract file concept
Communications of the ACM
Communications of the ACM
Full table quadratic searching for scatter storage
Communications of the ACM
Communications of the ACM
Communications of the ACM
A variant method of file searching
Communications of the ACM
An indirect chaining method for addressing on secondary keys
Communications of the ACM
Analysis of a file addressing method
Communications of the ACM
Random access file organization for indirectly addressed records
ACM '69 Proceedings of the 1969 24th national conference
Programming Languages, Information Structures, and Machine Organization.
Programming Languages, Information Structures, and Machine Organization.
Order-preserving key transformations
ACM Transactions on Database Systems (TODS)
Predictive test compression by hashing
SIGIR '87 Proceedings of the 10th annual international ACM SIGIR conference on Research and development in information retrieval
A compendium of key search references
ACM SIGIR Forum
Distributive join: a new algorithm for joining relations
ACM Transactions on Database Systems (TODS)
Techniques for collision resolution in hash tables with open addressing
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
ACM Computing Surveys (CSUR)
The study of an ordered minimal perfect hashing scheme
Communications of the ACM
Perfect hashing functions: a single probe retrieving method for static sets
Communications of the ACM
ACM-SE 16 Proceedings of the 16th annual Southeast regional conference
Storage management in APL machines
ACM SIGAPL APL Quote Quad
Efficiently instantiating view-objects from remote relational databases
The VLDB Journal — The International Journal on Very Large Data Bases
IEEE Transactions on Computers
A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table
VLDB '84 Proceedings of the 10th International Conference on Very Large Data Bases
On the implementation of parsing tables
ACM SIGPLAN Notices
An efficient signature representation and matching method for mobile devices
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
A Multifont Word Recognition System for Postal Address Reading
IEEE Transactions on Computers
Compact Hash Tables Using Bidirectional Linear Probing
IEEE Transactions on Computers
Contextual Postprocessing System for Cooperation with a Multiple-Choice Character-Recognition System
IEEE Transactions on Computers
Efficient signature based malware detection on mobile devices
Mobile Information Systems
Variable-length hash area entries
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
An introduction to computed chaining
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology
Data structures and data accessing in data base systems past, present, future
IBM Systems Journal
Gray code chaining: a high performance hashing algorithm for limited storage applications
International Journal of High Performance Systems Architecture
Recent developments in the theory of data structures
Computer Languages
Optimizing hash function number for BF-Based object locating algorithm
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II
Mercury: bringing efficiency to key-value stores
Proceedings of the 6th International Systems and Storage Conference
A cluster-based web service discovery in MANET environments
Mobile Information Systems
Hi-index | 0.05 |