skip to main content
10.1145/1795396.1795446acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article
Free Access

Multi-attribute inverted files implemented with hashing

Published:18 April 1977Publication History

ABSTRACT

A method is presented for implementing multi-attribute files using hashing. All inverted values are stored in a single shared hash area. The entries in the hash area are stored in variable-length form and contain the attribute values, the attribute name identifier, and one or more identifiers of records in the file which possess the attribute values. The file itself is directly accessable and stored in entry-sequence. In addition to retrieval methodology, the physical methodology for loading the hash area with the inverted values is given. Also, considerations for adding new records, and deleting and changing existing records are given.

References

  1. Lefkovitz, D. File Structures for On-line Systems, Spartan Books, New York, 1974.Google ScholarGoogle Scholar
  2. McKinney, M. H., Variable length hash area entries, to appear in Proc. 1977 NCC (June 1977). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Maurer, W. D.; and Lewis, T. G., Hash table methods, Computing Surveys 7, 1 (March 1975) pp. 5--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Knuth, D. E., The Art of Computer Programming: Vol. III: Sorting and Searching, Addison-Wesley, Reading, Mass., 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Multi-attribute inverted files implemented with hashing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ACM-SE 15: Proceedings of the 15th annual Southeast regional conference
          April 1977
          547 pages
          ISBN:9781450373029
          DOI:10.1145/1795396

          Copyright © 1977 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 April 1977

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate178of377submissions,47%
        • Article Metrics

          • Downloads (Last 12 months)17
          • Downloads (Last 6 weeks)6

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader