Access Restriction

Author Yuen, P. S. T. ♦ Lum, V. Y.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Hashing methods ♦ Randomizing ♦ Information retrieval ♦ File organization ♦ Key transformation ♦ Scatter storage ♦ File search ♦ Hashing techniques ♦ Keys ♦ Hashing ♦ Random access ♦ Direct access method ♦ Hash coding ♦ Key-to-address transformation ♦ Direct addressing
Abstract In an earlier paper by Lum, Yuen, and Dodd [1] experimental results comparing six commonly used key-to-address transformation techniques were presented. One transformation in that study referred to as “Lin's method” is an elaborate technique based on radix transformation. Andrew Lin has since pointed out to the authors that his method of transformation [2] consists of not just a radix transformation algorithm but also the specific ways the values of p and q are chosen as well as hardware implementation to carry out the steps of this transformation in an efficient manner. Since our study was intended for general radix transformations rather than Lin's specific implementation, we think it is more appropriate to change the label of that transformation in [1] from “Lin's method” to “generalized radix transformation method” and we use this term here.
Description Affiliation: IBM Research Lab., San Jose, CA (Lum, V. Y.; Yuen, P. S. T.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 15
Issue Number 11
Page Count 2
Starting Page 996
Ending Page 997

Open content in new tab

   Open content in new tab
Source: ACM Digital Library