skip to main content
article
Free Access

External Hashing Schemes for Collections of Data Structures

Authors Info & Claims
Published:01 January 1980Publication History
First page image

References

  1. 1 FLOYD, R.W. Algonthm 245: Treesort 3. Comm. ACM 7, 12 (Dec. 1964), 70l. Google ScholarGoogle Scholar
  2. 2 KLARNER, D A, AND RIVEST, R L A procedure for lmprovmg the upper bound for the number of n-ommoes Canad. J. Math 25 (1973), 585-602Google ScholarGoogle Scholar
  3. 3 KNUTH, D.E The Art of Computer Programming, Vol I FundamentalAlgortthms Addison-Wesley, Reading, Mass, 1968 Google ScholarGoogle Scholar
  4. 4 KNUTH, D E The Art of Computer Programming, Vol 3 Sorting and Searching. Addison-Wesley, Reading, Mass, 1973 Google ScholarGoogle Scholar
  5. 5 ROSENBERG, A L Managmg storage for extendible arrays SIAM J Comptng 4 (1975), 287-306Google ScholarGoogle Scholar
  6. 6 ROS~NaERG, A L On storing ragged arrays by hashing Math Syst Theory 10 (1976/77), 193-210Google ScholarGoogle Scholar
  7. 7 ROSENBERG, A L Direct-access storage of data structures Rlvtsta dt lnformattca VII (1977), 127-151Google ScholarGoogle Scholar
  8. 8 ROSENBERG, A L, AND STOCKMEYER, L J, Hashing schemes for extendible arrays J A CM 24, 2 (April 1977), 1999-221 Google ScholarGoogle Scholar
  9. 9 SNYDER, L On umquely representable data structures Proc 18th Annual IEEE Symp on Foundations of Computer Science, 1977, pp 142-146Google ScholarGoogle Scholar
  10. 10 VAN EMDE BOAS, P, KAAS, R, AND ZIJLSTRA, E Design and tmplementat,on of an efficient priority queue Math. Syst Theory 10 (1976/77), 99-127.Google ScholarGoogle Scholar
  11. 11 WHITTAKER, E T., AND WATSON, G N Modern Analysts. Cambndge U Press, London, 4th ed, 1958Google ScholarGoogle Scholar
  12. 12 YAO, A C, AND YAO, F.F. The complexity of searching an ordered random table Proc 17th Annual IEEE Symp on Foundauons of Computer Science, Houston, Texas, 1976, pp 173-177Google ScholarGoogle Scholar

Index Terms

  1. External Hashing Schemes for Collections of Data Structures

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Journal of the ACM
              Journal of the ACM  Volume 27, Issue 1
              Jan. 1980
              205 pages
              ISSN:0004-5411
              EISSN:1557-735X
              DOI:10.1145/322169
              Issue’s Table of Contents

              Copyright © 1980 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 January 1980
              Published in jacm Volume 27, Issue 1

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader