Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Weighted increment linear search for scatter tables

Published: 01 December 1972 Publication History

Abstract

A new linear search for hash tables whose increment step is a function of the key being addressed is presented. Comparisons with known methods are given, in terms of efficiency and computation complexity. In particular, the new method applies to tables of size n = 2r. It allows full table searching, and practically eliminates primary clustering at a very low cost.

References

[1]
Morris, R. Scatter storage techniques. Comm. ACM 11, 1 (Jan. 1968), 38-43.
[2]
Bell, J. R. The quadratic quotient method: a hash code eliminating econdary clustering. Comm. ACM 13, 2 (Feb. 1970), 107-109.
[3]
Maurer, W.D. An improved hash code for scatter storage. Comm. ACM 11, 1 (Jan. 1968), 35-38.
[4]
Radke, C.E. The use of quadratic residue research. Comm. ACM 13, 2 (Feb. 1970), 103-105.
[5]
Day, A. Colin. Full table quadratic searching for scatter storage. Comm. ACM 13, 8 (Aug. 1970), 481-482.
[6]
Bell, J. R. and Kaman, C. H. The linear quotient hash code. Comm. ACM 13, 11 (Nov. 1970), 675-677.

Cited By

View all
  • (2021)Theoretical Computer Science in Italy: The Early YearsIEEE Annals of the History of Computing10.1109/MAHC.2021.309987843:3(44-56)Online publication date: 1-Jul-2021
  • (2020)The mechanism of decrease in bearing capacity and performance evaluation of the yielding bolt in coal mineEnergy Science & Engineering10.1002/ese3.7558:9(3072-3086)Online publication date: 8-Jun-2020
  • (1990)A compendium of key search referencesACM SIGIR Forum10.1145/101306.10130824:3(26-42)Online publication date: 1-Nov-1990
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 15, Issue 12
Dec. 1972
117 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/361598
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1972
Published in CACM Volume 15, Issue 12

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. clustering
  2. hash addresss
  3. hash table
  4. key
  5. linear search
  6. scatter storage
  7. search length
  8. weighted increment search

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)50
  • Downloads (Last 6 weeks)9
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media