Access Restriction

Author Dodd, M. ♦ Yuen, P. S. T. ♦ Lum, V. Y.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword File organizations ♦ Hashing methods ♦ Randomizing ♦ Cluster ♦ Information retrieval ♦ File addressing ♦ Key transformation ♦ Scatter storage ♦ Collisions ♦ File structures ♦ Hashing techniques ♦ Keys ♦ Search ♦ Hashing ♦ Random access ♦ Direct access method ♦ Hash coding ♦ Key-to-address transformation ♦ Direct addressing
Description Affiliation: IBM Research Lab., San Jose, CA (Lum, V. Y.; Yuen, P. S. T.; Dodd, M.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 14
Issue Number 4
Page Count 12
Starting Page 228
Ending Page 239

Open content in new tab

   Open content in new tab
Source: ACM Digital Library