Skip to main content
Log in

On storing ragged arrays by hashing

  • Published:
Mathematical systems theory Aims and scope Submit manuscript

Abstract

The inevitably poor utilization of storage by computed-access realizations of extendible rectangular arrays can be circumvented by storing such arrays by hashing. This paper studies the extent to which the same switch in storage strategy avoids the even worse utilization of storage by computed-access realizations of extendible ragged (i.e., nonrectangular) arrays. Unfortunately, the dramatic successes of the rectangular case do not carry over: any hashing scheme for extendible ragged arrays with storage demands very much smaller than those of computed-access realizations must suffer expected access time that is close to worst possible. On the other hand, one can obtain moderate savings in storage demands by hashing ragged arrays, together with sufferable access time. This last result issues from a general technique for trading increased access time for savings in storage. Even more striking savings are attainable if one restricts attention tofully-justified ragged arrays, whose raggedness is more regular than that of general ragged arrays. However, the overall impact of our results is that extendible ragged arrays do not succumb to the storage strategies that work efficiently on their rectangular counterparts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. P. Chowla, On some polynomials which represent every natural number exactly once,Det Kongelige Norske Videnskabers Selskabs Forhandliger 34 (1961) 512–513.

    Google Scholar 

  2. E. D. S. de Villiers andL. B. Wilson, Hash coding methods for sparse matrices, Tech. Rpt. 45, Computing Lab., Univ. of Newcastle-upon-Tyne, 1973; see also: Hashing the subscripts of a sparse matrix,BIT,14 (1974) 347–358.

    Google Scholar 

  3. D. E. Knuth,The Art of Computer Programming I: Fundamental Algorithms, Addison-Wesley, Reading, Mass., 1968.

    Google Scholar 

  4. D. E. Knuth,The Art of Computer Programming III: Sorting and Searching, Addison-Wesley, Reading, Mass., 1973.

    Google Scholar 

  5. D. J. Rose andR. A. Willoughby, eds.Sparse Matrices and Their Applications, Plenum Press, New York, 1972.

    Google Scholar 

  6. A. L. Rosenberg, Computed access in ragged arrays, inInformation Processing 74 (J. Rosenfeld, ed.) North-Holland, Amsterdam, 1974, 642–646.

    Google Scholar 

  7. A. L. Rosenberg, Allocating storage for extendible arrays,Journ. ACM 21 (1974) 652–670.

    Google Scholar 

  8. A. L. Rosenberg, Managing storage for extendible arrays.SIAM J. Comput. 4 (1975) 287–306.

    Google Scholar 

  9. A. L. Rosenberg andL. J. Stockmeyer, Hashing schemes for extendible arrays,Journ. ACM, to appear.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rosenberg, A.L. On storing ragged arrays by hashing. Math. Systems Theory 10, 193–210 (1976). https://doi.org/10.1007/BF01683272

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01683272

Keywords