skip to main content
10.1145/503561.503598acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article
Free Access

An application of hash codes for disk file access, using multiple buckets

Published:22 April 1976Publication History

ABSTRACT

Hash code methods are widely used for retrieval of information from tables in memory and from direct access storage devices. A key is input to an algorithm which calculates the memory location or the disk address wanted. This paper explains hash code methods for direct disk access by way of a particular application example.The application includes the use of multiple buckets, where each bucket is a separate disk file. Synonym overflow is handled by trying to place a record only once in each bucket (file), and finally placing the record in an overflow bucket (file) if no place could be found in the primary files.The main goal of this design was to utilize 90-95% of the allocated disk space before the average access time became significantly degraded. This is in contrast with the usual requirement for hash code disk access in a single large file that there be about 20% excess space over the amount actually needed.The application was first implemented on an IBM 1130 and was originally conceived to overcome limitations on the size of a single physical file on that machine. It is now running on a Hewlett Packard 3000. The file capacity is 18,000 optometric clinic patient records.

  1. An application of hash codes for disk file access, using multiple buckets

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACM-SE 14: Proceedings of the 14th annual Southeast regional conference
      April 1976
      406 pages
      ISBN:9781450373319
      DOI:10.1145/503561

      Copyright © 1976 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 April 1976

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate178of377submissions,47%
    • Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader