Access Restriction

Author Johnson, L. R.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Methods for entering random-access files on the basis of one key are briefly surveyed. The widely used chaining method, based on a pseudo-random key transformation, is reviewed in more detail. An efficient generalization of the chaining method which permits recovery on additional keys is then presented.
Description Affiliation: I.B.M. Corp., Yorktown Heights, NY (Johnson, L. R.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 4
Issue Number 5
Page Count 5
Starting Page 218
Ending Page 222

Open content in new tab

   Open content in new tab
Source: ACM Digital Library