1975
DOI: 10.1093/comjnl/18.3.265
|View full text |Cite
|
Sign up to set email alerts
|

Hashing functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

1981
1981
2015
2015

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(37 citation statements)
references
References 0 publications
0
37
0
Order By: Relevance
“…Although the related surveys by Knott [1975] and Comer [1979] are somewhat dated, they represent good coverage of the different approaches. In practice, the most common one-dimensional structures include linear hashing [Litwin 1980;Larson 1980], extendible hashing [Fagin et al 1979], and the B-tree [Bayer and McCreight 1972].…”
Section: One-dimensional Access Methodsmentioning
confidence: 99%
“…Although the related surveys by Knott [1975] and Comer [1979] are somewhat dated, they represent good coverage of the different approaches. In practice, the most common one-dimensional structures include linear hashing [Litwin 1980;Larson 1980], extendible hashing [Fagin et al 1979], and the B-tree [Bayer and McCreight 1972].…”
Section: One-dimensional Access Methodsmentioning
confidence: 99%
“…It is certainly not in the scope of this text the design of hash functions that are most appropriate to each case, a subject that requires statistical tools and specific study [15]. The algorithms presented in this paper, however, do not depend upon complicated, custom-tailored hash functions.…”
Section: Hashingmentioning
confidence: 99%
“…This is important because index permutation is a common error when code is parallelised and evolved. (In applications that might wish to ignore permutations this attribute could be excluded from the desirable list or properties) According to [24], hash functions such as the Bob Jenkins' hash function, FNV hash functions, the SHA hash family, or the MD hash family all exhibit the above properties [24,25], with advanced hashing evaluation and design techniques discussed in [26][27][28]. As a result, we have chosen Bob Jenkins' hash function and FNV hash function, because they are relatively simple to implement, work consistently on different data types, and promise very efficient performance, while being hardware and platform independent.…”
Section: Desirable Hash Function Propertiesmentioning
confidence: 99%