Affiliation:
1. Istituto di Elaborazione della Informazione del Consiglo Nazionale delle Ricerche, Pisa, Italy
Abstract
A refinement of hashing which allows retrieval of an item in a static table with a single probe is considered. Given a set I of identifiers, two methods are presented for building, in a mechanical way, perfect hashing functions, i.e. functions transforming the elements of I into unique addresses. The first method, the “quotient reduction” method, is shown to be complete in the sense that for every set I the smallest table in which the elements of I can be stored and from which they can be retrieved by using a perfect hashing function constructed by this method can be found. However, for nonuniformly distributed sets, this method can give rather sparse tables. The second method, the “remainder reduction” method, is not complete in the above sense, but it seems to give minimal (or almost minimal) tables for every kind of set. The two techniques are applicable directly to small sets. Some methods to extend these results to larger sets are also presented. A rough comparison with ordinary hashing is given which shows that this method can be used conveniently in several practical applications.
Publisher
Association for Computing Machinery (ACM)
Reference7 articles.
1. The external language KLIPA for the URAL-2 digital computer
2. Hashing functions
3. An empirical study of FORTRAN programs
4. Knuth D.E. The Art of Computer Programming Vol. 1-3. Addison-Wesley Reading Mass. 1968-1973. Knuth D.E. The Art of Computer Programming Vol. 1-3. Addison-Wesley Reading Mass. 1968-1973.
5. Hash Table Methods
Cited by
99 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献