A Note on the Analysis of Extendible Hashing