Hash tables
暂无分享,去创建一个
[1] W. W. Peterson,et al. Addressing for Random-Access Storage , 1957, IBM J. Res. Dev..
[2] S. Swierczkowski. On successive settings of an arc on the circumference of a circle , 1958 .
[3] Andrei P. Ershov. On programming of arithmetic operations , 1958, CACM.
[4] Werner Buchholz,et al. File Organization and Addressing , 1963, IBM Syst. J..
[5] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[6] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[7] Donald E. Knuth,et al. Ordered Hash Tables , 1974, Comput. J..
[8] Norman L. Johnson,et al. Urn models and their application , 1977 .
[9] Renzo Sprugnoli,et al. Perfect hashing functions , 1977, Commun. ACM.
[10] Efrem G. Mallach. Scatter Storage Techniques: A Unifying Viewpoint and a Method for Reducing Retrieval Times , 1977, Comput. J..
[11] Gordon Lyon,et al. Packed scatter tables , 1978, CACM.
[12] Ronald L. Rivest. Optimal Arrangement of Keys in a Hash Table , 1978, JACM.
[13] Witold Litwin,et al. Virtual Hashing: A Dynamically Changing Hashing , 1978, VLDB.
[14] Andrew Chi-Chih Yao,et al. Should Tables Be Sorted? , 1981, JACM.
[15] Ronald Fagin,et al. Extendible hashing—a fast access method for dynamic files , 1979, ACM Trans. Database Syst..
[16] M. G. Anderson,et al. Comments on perfect hashing functions: a single probe retrieving method for static sets , 1979, CACM.
[17] Robert E. Tarjan,et al. Storing a sparse table , 1979, CACM.
[18] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[19] Richard J. Cichelli. Minimal perfect hash functions made simple , 1980, CACM.
[20] Gaston H. Gonnet,et al. Expected Length of the Longest Probe Sequence in Hash Code Searching , 1981, JACM.
[21] János Komlós,et al. Storing a sparse table with O(1) worst case access time , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[22] Robert H. Morris,et al. Scatter storage techniques , 1983, CACM.
[23] Chin-Chen Chang. An ordered minimal perfect hashing scheme based upon Euler's theorem , 1984, Inf. Sci..
[24] Torben U. Zahle,et al. Cascade Hashing , 1984, VLDB.
[25] C. C. Chang. The study of an ordered minimal perfect hashing scheme , 1984, CACM.
[26] J. Ian Munro,et al. Robin hood hashing , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[27] Thomas J. Sager. A polynomial time generator for minimal perfect hash functions , 1985, CACM.
[28] J. Ian Munro,et al. Techniques for Collision Resolution in Hash Tables with Open Addressing , 1986, FJCC.
[29] Francine Berman,et al. Collections of Functions for Perfect Hashing , 1986, SIAM J. Comput..
[30] Wen-Chin Chen,et al. Design and Analysis of Coalesced Hashing , 1986 .
[31] János Körner,et al. New Bounds for Perfect Hashing via Information Theory , 1988, Eur. J. Comb..
[32] Giovanni Soda,et al. An algebraic approach to Cichelli's perfect hashing , 1989, BIT Comput. Sci. Sect..
[33] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[34] G. H. Gonnet,et al. Handbook of algorithms and data structures: in Pascal and C (2nd ed.) , 1991 .
[35] Wojciech Rytter,et al. Analysis of algorithms and data structures , 1991, International computer science series.
[36] Friedhelm Meyer auf der Heide,et al. Efficient PRAM simulation on a distributed memory machine , 1992, STOC '92.
[37] Friedhelm Meyer auf der Heide,et al. Dynamic Perfect Hashing: Upper and Lower Bounds , 1994, SIAM J. Comput..
[38] George Havas,et al. Perfect Hashing , 1997, Theor. Comput. Sci..
[39] Eli Upfal,et al. Balanced Allocations , 1999, SIAM J. Comput..
[40] J. Ian Munro,et al. Membership in Constant Time and Almost-Minimum Space , 1999, SIAM J. Comput..