skip to main content
article
Free Access

Ubiquitous B-Tree

Authors Info & Claims
Published:01 June 1979Publication History
First page image

References

  1. AHO74 AHO, A., HOPCROFT, J., AND ULLMAN, j. The design and analysts of computer algorithms, Addison Wesley, Publ. Co., Reading, Mass., 1974. Google ScholarGoogle Scholar
  2. AUER76 AuER, R. Schlusselkompress~onen ~n B*-baumen, Diplomarbeit, Tech. Umversitat, Munich, 1976.Google ScholarGoogle Scholar
  3. BAYE72 BAYER, R, AND MCCREmHT, C "Organization and maintenance of large ordered indexes," Acta inf. 1, 3 (1972), 173- 189.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BAYE72a BAYER, R. "Binary B-trees for virtual memory," in Proc 1971 ACM SIGFIDET Workshop, ACM, New York, 219-235.Google ScholarGoogle Scholar
  5. BAYE73 BAYER, R. "Symmetric binary B-trees. data structure and maintenance algorithms," Acta Inf. 1, 4 (1972), 290-306Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BAYE76 BAYER, R., AND METZGER, J. "On encipherment of search trees and random access files," A CM Trans. Database Syst. 1, 1 (March 1976), 37-52. Google ScholarGoogle Scholar
  7. BAYE77 BAYER, R, AND UNTERAUER, K. "PrefLx B-trees," A CM Trans. Database Syst. 2, 1 (March 1977), 11-26. Google ScholarGoogle Scholar
  8. BAYE77a BAYER, R., AND SCHKOLNICK, M. "Concurrency of operations on B-trees," Acta Inf. 9, 1 (1977), 1-21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. BERL78 BERLINER, H. The B*-tree search algorithm: a best-fwst proof procedure, Tech. Rep. CMU-CA-78-112, Computer Scmnce Dept, Carnegie-Mellon Univ., Pittsburgh, 1978.Google ScholarGoogle Scholar
  10. BROW78 BROWN, M "A storage scheme for height-balanced trees," Inf. Process. Lett. 7, 5 (Aug. 1978), 231-232.Google ScholarGoogle ScholarCross RefCross Ref
  11. BROW78a BROWN, M. "A partial analysis of height-balanced trees," SIAM J. Comput., to appear.Google ScholarGoogle Scholar
  12. CLAM64 CLAMPETT, H. "Randomized binary searching with tree structures," Commun. ACM 7, 3 (March 1964), 163-165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. FOST65 FOSTER, C. "Information storage and retrieval using AVL trees," m Proc. A CM 20th Natmnal Conf., ACM, New York, 1965, 192-205. Google ScholarGoogle Scholar
  14. GHOS69 GHOSH, S, AND SENKO, M. "File organization: on the selection of random access index points for sequential files," J ACM 16, 4 (Oct. 1969), 569-579. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. GUIB77 GUIBUS, L., MCCREIGHT, E., PLASS, M., AND ROBERTS, J. "A new representation for linear lists," m Proc. 9th A CM Symp. Theory of Computing, ACM, New York, 1977, 49-60. Google ScholarGoogle Scholar
  16. GUIB78 GUIBAS, L., AND SEDGEWICK, R. "A dichromatic framework for balanced trees," m Proc 19th Syrup. Foundatmns of Computer Science, 1978, 8-21.Google ScholarGoogle Scholar
  17. HELD78 HELD, G., AND STONEBRAKER, M. "B- trees reexamined," Commun. A CM 21, 2 (Feb. 1978), 139-143. Google ScholarGoogle Scholar
  18. HORO76 HOROWITZ, E., AND SAHNI, S. Fundamentals of data structures, Computer Science Press, Inc., Woodland Hills, Calif., 1976.Google ScholarGoogle Scholar
  19. IBM1 OS/VS Virtual Storage Access Method (VSAM) planning gutde, Order No. GC26-3799, IBM, Armonk, N.Y.Google ScholarGoogle Scholar
  20. IBM2 OS/VS Vwtual Storage Access Method (VSAM) logw, Order No. SY26-3841, IBM, Armonk, N.Y.Google ScholarGoogle Scholar
  21. KARL76 KARLTON, P., FULLER, S., SCROGGS, R., AND KACHLER, E. "Performance of height balanced trees," Commun. A CM 19, 1 (Jan. 1976), 23-28. Google ScholarGoogle Scholar
  22. KEEH74 KEEHN, D., AND LACY, J. "VSAM data set design parameters," IBM Syst. J. 3, (1974), 186-212.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. KNUT68 KNUTH, D. The art of computer programmmg, Vol. 1. fundamental algorithms, Addison-Wesley Publ. Co., Reading, Mass, 1968. Google ScholarGoogle Scholar
  24. KNUT73 Kr~UTH, D. The art of computer programmmg, Vol. 3: sorting and searching, Addison-Wesley Publ. Co, Reading, Mass., 1973. Google ScholarGoogle Scholar
  25. MARU77 MARUYAMA, K, AND SMITH, S. "Analysis of design alternatives for virtual memory indexes," Commun. A CM 20, 4 (April 1977), 245-254. Google ScholarGoogle Scholar
  26. MAUE75 MAUER, W., AND LEWIS, T. "Hash table methods," Comput. Surv. 7, 1 (March 1975), 5-19. Google ScholarGoogle Scholar
  27. MCCR77 MCCREIGHT, E. "Pagination of B*-trees with variable-length records," Commun. ACM 20, 9 (Sept. 1977), 670-674 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. MILL77 MILLER, R., PIPPENGER, N., ROSENBERG, A., AND SNYDER, L. Optimal 2-3 trees, IBM Research Rep. RC 6505, IBM Research Lab, Yorktown Heights, N.Y., 1977.Google ScholarGoogle Scholar
  29. NIEV74 NIEVERGELT, J. "Binary search trees and file orgamzatmn," Comput. Surv. 6, 3 (Sept. 1973), 195-207. Google ScholarGoogle Scholar
  30. ORGA72 ORGANICK, E. The Multics system: an exammatmn of tts structure, MIT Press, Cambridge, Mass., 1972. Google ScholarGoogle Scholar
  31. ROSE78 ROSENBERG, A, AND SNYDER, L. "Minimal comparison 2-3 trees," SIAM J. Comput 7, 4 (Nov. 1978), 465-480.Google ScholarGoogle ScholarCross RefCross Ref
  32. RUBI76 RUBIN, F "Experiments in text file compressmn," Commun. ACM 19, 11 (Nov 1976), 617-623. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. SAMA76 SAMADI, B. "B-trees m a system w~th multiple vmws," Inf. Process. Lett. 5, 4 (Oct. 1976), 107-112Google ScholarGoogle ScholarCross RefCross Ref
  34. SEVE74 SEVERENCE, D. "Identifier search mechnisms, a survey and generahzed model," Comput. Surv 6, 3 (Sept. 1974), 175-194. Google ScholarGoogle Scholar
  35. WAGN73 WAGNER, R. "Indexing demgn considerations," IBM Syst. J. 4, (1973), 351-367.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. WEDE74 WEDEKIND, H. "On the selection of access paths in a database system," in Data base management (Proc. IFIP Working Conf. Data Base Management) J Klimbie and K. Koffeman (Eds.), Elsevier/ North-Holland Pubhshmg Co., New York, 1974, 385-397.Google ScholarGoogle Scholar
  37. WIRT76 WIRTH, N. Algorithms + data structures --programs, Prentlce-HaU Inc., Englewood Cliffs, N J., 1976. Google ScholarGoogle Scholar
  38. YAO78 YAO, A. "On random 2-3 trees," Acta Inf. 9, 2 (1978), 159-170.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ubiquitous B-Tree

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 11, Issue 2
      June 1979
      108 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/356770
      Issue’s Table of Contents

      Copyright © 1979 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 June 1979
      Published in csur Volume 11, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader