The cubic search method

  • Romuald Jagielski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 45)


Search Method Hash Function Table Size Linear Search Hash Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Morris, Robert Scatter storage techniques. Comm.ACM 11, 1 (Jan. 1968), 34–44Google Scholar
  2. 2.
    Maurer, W.D. An improved hash code for scatter storage. Comm.ACM 11, 1 (Jan. 1968), 35–38CrossRefGoogle Scholar
  3. 3.
    Radke, Charles E. The use of quadratic residue research, Comm.ACM 13, 2 (Feb. 1970), 103–105CrossRefGoogle Scholar
  4. 4.
    Day, Colin A. Full table quadratic searching for scatter storage. Comm.ACM 13, 8 (Aug. 1970), 481–482CrossRefGoogle Scholar
  5. 5.
    Batagelj V. The quadratic hash method when the table size is not a prime number. Comm. ACM 18,4 (Apr. 1975), 216–217CrossRefGoogle Scholar
  6. 6.
    Sierpiński Wacław Elementary theory of numbers. Państwowe Wydawnictwo Naukowe, Warszawa, 1964Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1976

Authors and Affiliations

  • Romuald Jagielski
    • 1
  1. 1.Institute of MathematicsUniversity of GdańskPoland

Personalised recommendations