NOTE ON WHEN TO CHAIN OVERFLOW ITEMS WITHIN A DIRECT-ACCESS TABLE

被引:2
作者
BAYS, C [1 ]
机构
[1] UNIV S CAROLINA,COLUMBIA,SC 29208
关键词
D O I
10.1145/361932.361945
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:46 / 47
页数:2
相关论文
共 4 条
[1]   AN INDIRECT CHAINING METHOD FOR ADDRESSING ON SECONDARY KEYS [J].
JOHNSON, LR .
COMMUNICATIONS OF THE ACM, 1961, 4 (05) :218-222
[2]   KEY-TO-ADDRESS TRANSFORM TECHNIQUES - FUNDAMENTAL PERFORMANCE STUDY ON LARGE EXISTING FORMATTED FILES [J].
LUM, VY ;
YUEN, PST ;
DODD, M .
COMMUNICATIONS OF THE ACM, 1971, 14 (04) :228-&
[3]   A VARIANT METHOD OF FILE SEARCHING [J].
MCILROY, MD .
COMMUNICATIONS OF THE ACM, 1963, 6 (03) :101-101
[4]   SCATTER STORAGE TECHNIQUES [J].
MORRIS, R .
COMMUNICATIONS OF THE ACM, 1968, 11 (01) :38-&