Access Restriction

Author Bell, James R.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Symbol table ♦ Table look-up ♦ Collisions ♦ Calculated address ♦ Keys ♦ Search ♦ Hash code ♦ Hashing ♦ Clustering ♦ Scatter storage
Abstract Secondary clustering as a cause of hash code inefficiency is discussed, and a new hashing method based on its elimination is presented. Comparisons with previous methods are made both analytically and empirically.
Description Affiliation: Digital Equipment Corp., Maynard, MA (Bell, James R.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 26
Issue Number 1
Page Count 2
Starting Page 62
Ending Page 63

Open content in new tab

   Open content in new tab
Source: ACM Digital Library