1974
DOI: 10.1145/356631.356633
|View full text |Cite
|
Sign up to set email alerts
|

Identifier Search Mechanisms: A Survey and Generalized Model

Abstract: Generalized ModelAn important functional component of ever.y file organization is the set of search mechanisms which are used to locate individually identified records during the process of either update or retrieval. There have been a large number of computer-related search techniques developed in the past 20 years. The objective of this article is to synthesize many of these techniques into one parametrically describable search mechanism. This is accomplished by separating search techniques into two categrie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

1976
1976
2002
2002

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…A list implementation offers space savings if a trie node has only a few children, when an array of fixed size would consist largely of null pointers. However, the space savings come at the expense of a linked list traversal in each node instead of a simple array lookup [43]. Sussenguth [46] proposed a modified form of the linked list implementation of a trie, called a double-chained tree, in which all children of a node are placed in a list as in the linked-list implementation explained above.…”
Section: Related Workmentioning
confidence: 99%
“…A list implementation offers space savings if a trie node has only a few children, when an array of fixed size would consist largely of null pointers. However, the space savings come at the expense of a linked list traversal in each node instead of a simple array lookup [43]. Sussenguth [46] proposed a modified form of the linked list implementation of a trie, called a double-chained tree, in which all children of a node are placed in a list as in the linked-list implementation explained above.…”
Section: Related Workmentioning
confidence: 99%
“…This together with the unifying approach of [13] motivates our differing method of introducing EXHASH. It also appears that a one level directory is not always optimal for order preserving address transformations (as in the case analyzed in [1]) because of the large effect on directory size caused by non-uniformity.…”
Section: T(t) = L(t)+ (I(t)-1)/(m-1)mentioning
confidence: 99%
“…For each i, 0 =< i < di(T), there is a corresponding directory interval I ~ dm, aAccess to the leaf buckets of a trie can be implemented either as an (m-ary) tree [13,15,22,24] or utilizing a one level directory with di (T) elements I-1, 13] leading to direct calculated access to the leaves. Knuth [24, exercise 6.3.20] describes a structure very similar to the BT above.…”
Section: (T) = M D(t)mentioning
confidence: 99%
See 2 more Smart Citations