BIT Numerical Mathematics

, Volume 24, Issue 3, pp 317–332 | Cite as

Hashing with Overflow Indexing

  • Aimo A. Törn
Part I Computer Science

Abstract

A hash structure, Overflow Indexing (OVI), using an index for the overflows is presented. The index contains one entry (key, bucket number) for each overflow. Formulas for computing the expected number of entries in the index and the standard deviation are derived and the numerical results obtained using these formulae are presented in a graph. It is concluded that storing the index in the main memory when operating on the file is feasible for small to medium-sized, and sometimes even large files. The number of probes for both a successful and unsuccessful search is one. Deletion requires two probes and insertion two or three probes. Details of OVI are presented and illustrated by simulation experiments. The structure of the index is discussed and one possible structure, hashing with dynamic buckets, is presented.

CR Categories and Subject Descriptors

H.2.2Database Management: Physical Design — Access methods 

General Terms

Design Experimentation Performance 

Additional Key Words and Phrases

file organization hash-table representations indexing methods 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    D. S. Batory,Optimal file designs and reorganization points, ACM Trans. Database Syst. 7, 1 (March 1982), 60–81.Google Scholar
  2. 2.
    A. T. Berztiss,Data Structures, Theory and Practice, Academic Press, New York, 1975.Google Scholar
  3. 3.
    R. Fagin, J. Nievergelt, N. Pippenger and H. R. Strong,Extendible hashing — a fast access method for dynamic files, ACM Trans. Database Syst. 4, 3 (Sept. 1979), 315–344.Google Scholar
  4. 4.
    N. I. Johnson and S. Kotz,Discrete Distributions, Houghton Mifflin, Boston, 1969.Google Scholar
  5. 5.
    P. Å. Larson,Dynamic hashing, BIT, 18, 2 (1978), 184–201.Google Scholar
  6. 6.
    V. Y. Lum, P. S. T. Yuen and M. Dodd,Key-to-address transform techniques: a fundamental performance study on largé existing formatted files, Comm. ACM 14, 4 (April 1971), 228–239.Google Scholar
  7. 7.
    J. A. van der Pool,Optimal storage allocation for initial loading of a file, IBM J. Res. Develop. 16 (1972), 579–586.Google Scholar
  8. 8.
    B. Schneiderman,Optimum data base reorganization points, Comm. ACM, 16, 6 (June 1973), 362–365.Google Scholar

Copyright information

© BIT Foundations 1984

Authors and Affiliations

  • Aimo A. Törn
    • 1
  1. 1.Åbo Akademi, Department of Information ProcessingÅBO 50Finland

Personalised recommendations