Implementations for coalesced hashing
- 1 December 1982
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 25 (12) , 911-926
- https://doi.org/10.1145/358728.358745
Abstract
The coalesced hashing method is one of the faster searching methods known today. This paper is a practical study of coalesced hashing for use by those who intend to implement or further study the algorithm. Techniques are developed for tuning an important parameter that relates the sizes of the address region and the cellar in order to optimize the average running times of different implementations. A value for the parameter is reported that works well in most cases. Detailed graphs explain how the parameter can be tuned further to meet specific needs. The resulting tuned algorithm outperforms several well-known methods including standard coalesced hashing, separate (or direct) chaining, linear probing, and double hashing. A variety of related methods are also analyzed including deletion algorithms, a new and improved insertion strategy called varied-insertion, and applications to external searching on secondary storage devices.Keywords
This publication has 6 references indexed in Scilit:
- Deletion algorithms for hashing that preserve randomnessJournal of Algorithms, 1982
- A shared-memory scheme for coalesced hashingInformation Processing Letters, 1981
- Tuning the coalesced hashing method to obtain optimum performancePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Extendible hashing—a fast access method for dynamic filesACM Transactions on Database Systems, 1979
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- Handling identifies as internal symbols in language processorsCommunications of the ACM, 1959