An indirect chaining method for addressing on secondary keys

  • Authors:
  • L. R. Johnson

  • Affiliations:
  • I.B.M. Corp., Yorktown Heights, NY

  • Venue:
  • Communications of the ACM
  • Year:
  • 1961

Quantified Score

Hi-index 48.33

Visualization

Abstract

Methods for entering random-access files on the basis of one key are briefly surveyed. The widely used chaining method, based on a pseudo-random key transformation, is reviewed in more detail. An efficient generalization of the chaining method which permits recovery on additional keys is then presented.