Programming Technique: An improved hash code for scatter storage
Communications of the ACM
Communications of the ACM
A compendium of key search references
ACM SIGIR Forum
ACM Transactions on Database Systems (TODS)
Identifier Search Mechanisms: A Survey and Generalized Model
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Reducing the retrieval time of hashing method by using predictors
Communications of the ACM
Improving the access time for random access files
Communications of the ACM
Communications of the ACM
Communications of the ACM
The quadratic hash method when the table size is not a prime number
Communications of the ACM
Quadratic search for hash tables of sizes P n
Communications of the ACM
Weighted increment linear search for scatter tables
Communications of the ACM
The reallocation of hash-coded tables
Communications of the ACM
Reducing the retrieval time of scatter storage techniques
Communications of the ACM
Common phrases and minimum-space text storage
Communications of the ACM
Algorithm 444: an algorithm for extracting phrases in a space-optimal fashion
Communications of the ACM
Communications of the ACM
Comment on Bell's quadratic quotient method for hash coded searching
Communications of the ACM
Communications of the ACM
BLISS: a language for systems programming
Communications of the ACM
MPACT: microprocessor application to control-firmware translator
ACM SIGDA Newsletter
Hash table methods for case statements
ACM-SE 20 Proceedings of the 20th annual Southeast regional conference
An image matrix for accessing files
ACM '72 Proceedings of the ACM annual conference - Volume 1
Minimizing the retrieval time of scatter storage techniques
ACM '78 Proceedings of the 1978 annual conference - Volume 2
A graduate course in database management
ACM SIGMOD Record
Bibliography on data base structures
ACM SIGMIS Database
Hi-index | 48.45 |
Secondary clustering as a cause of hash code inefficiency is discussed, and a new hashing method based on its eliminiation is presented. Comparisons with previous methods are made both analytically and empirically.