Thumbnail
Access Restriction
Subscribed

Author Johnson, L. R.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Methods for entering random-access files on the basis of one key are briefly surveyed. The widely used chaining method, based on a pseudo-random key transformation, is reviewed in more detail. An efficient generalization of the chaining method which permits recovery on additional keys is then presented.
Description Affiliation: I.B.M. Corp., Yorktown Heights, NY (Johnson, L. R.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 4
Issue Number 5
Page Count 5
Starting Page 218
Ending Page 222


Open content in new tab

   Open content in new tab
Source: ACM Digital Library