Skip to main content
Log in

Tightly controlled linear hashing without separate overflow storage

  • Part I Computer Science
  • Published:
BIT Numerical Mathematics Aims and scope Submit manuscript

Abstract

A hashing method is presented where the amount of storage required for a file can expand and shrink by very large factors. The performance of this method as measured by lookup time, insertion time and deletion time is very good even when the total storage utilization is as high as 90 percent. The user can completely control the storage utilization between two chosen bounds so that the storage requirement varies linearly with the number of records currently in the file.

Unlike previous methods, no separate overflow storage pool is involved and one need not be concerned with expected and worst case requirements for overflow space. Indeed, the absence of requirements for such a separate overflow pool could allow the use of this method with primitive microprocessor operating systems.

The choice of hashing functions is discussed and simulation results show great danger in blindly using the popular remainder method.

Both an elementary analysis and simulation results are given.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. W. Litwin,Linear hashing: A new method for file and table addressing, Proc. 6th Conf. on Very Large Databases, Montreal, Oct. 1980.

  2. P. Larson,Linear hashing with partial expansions, Proc. 6th Conf. on Very Large Databases, Montreal Oct. 1980.

  3. R. Fagin, J. Nievergelt, W. Pippenger, H. Strong,Extendible hashing — a fast access method for dynamic files, ACM Trans. Database Systems, vol. 4, no. 3, 1979.

  4. P. Larson,Dynamic hashing, BIT vol 18, no. 2 1978.

  5. V. Y. Lum,General performance analysis of key to address transformational methods, CACM 16, Oct. 1973.

  6. D. E. Knuth,The Art of Computer Programming, Vol. 3, Addison-Wesley, Reading, Mass. 1974.

    Google Scholar 

  7. D. E. Knuth,The Art of Computer Programming, Vol. 1, Addison-Wesley, Reading, Mass. 1973.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

This research was supported by the National Science and Engineering Research Council of Canada.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mullin, J.K. Tightly controlled linear hashing without separate overflow storage. BIT 21, 390–400 (1981). https://doi.org/10.1007/BF01932837

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01932837

Key words

Navigation