An indirect chaining method for addressing on secondary keys
Communications of the ACM
Analysis of a file addressing method
Communications of the ACM
A Note on the Efficiency of Hashing Functions
Journal of the ACM (JACM)
Identifier Search Mechanisms: A Survey and Generalized Model
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Communications of the ACM - Special 25th Anniversary Issue
A note on when to chain overflow items within a direct-access table
Communications of the ACM
Communications of the ACM
Communications of the ACM
A history of the SNOBOL programming languages
ACM SIGPLAN Notices - Special issue: History of programming languages conference
File organization and addressing
IBM Systems Journal
Bibliography on data base structures
ACM SIGMIS Database
Hi-index | 48.27 |
Trapping an instruction which cannot normally be trapped can be worthwhile, particularly when an existing program is to be revised. However, under those circumstances one would desire to replace instructions on a one-for-one basis.