Skip to main content
Log in

Hashing techniques, a global approach

  • Published:
BIT Numerical Mathematics Aims and scope Submit manuscript

Abstract

A new method for more equitable comparison of various hash table techniques is presented. It is applied to some popular techniques: open addressing, coalescent chaining and separate chaining. Another method, indexed sub-tables, is also examined with more details and shown to present some interesting features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. C. Bays,A note on when to chain overflow items within a direct-access table, CACM vol. 16,1 (1973), 46–47.

    Google Scholar 

  2. C. Bays,Some techniques for structuring chained hash tables, The Computer Journal vol. 16,2 (1973), 126–131.

    Article  Google Scholar 

  3. I. F. Blake and A. G. Konheim,Big buckets are (are not) better!, JACM vol. 24,4 (1977), 591–606.

    Article  Google Scholar 

  4. R. P. Brent,Reducing the retrieval time of scatter storage techniques, CACM vol. 16,2 (1973), 105–109.

    Google Scholar 

  5. R. Devillers and G. Louchard,Hashing techniques — a global approach, Technical Report 67, Laboratoire d'Informatique Théorique, Université Libre de Bruxelles, Brussels, Belgium.

  6. J. A. Feldman and J. R. Low,Comment on Brent's scatter storage algorithm, CACM vol. 16,11 (1973), 703.

    Google Scholar 

  7. D. E. Knuth,The Art of Computer Programming, vol. 3:Sorting and Searching, Addison-Wesley (1973).

  8. F. A. Williams,Handling identifiers as internal symbols in language processors, CACM vol. 2,6 (1959), 21–24.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Devillers, R., Louchard, G. Hashing techniques, a global approach. BIT 19, 302–311 (1979). https://doi.org/10.1007/BF01930984

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01930984

Keywords

Navigation