Abstract
In this paper, a simple method shall be presented to construct minimal perfect hashing functions suitable for letter oriented keys. We applied this minimal perfect hashing method successfully to four non-trivial key sets: (1) the set of twelve months in English, (2) the set of thirty four non-printable ASCII identifiers, (3) the set of thirty one most frequently used English words, (4) the set of thirty six PASCAL reserved words.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chang, C. C., (1984a): The Study of an Ordered Minimal Perfect Hashing Scheme, Communications of the Association for Computing Machinery, Vol. 27, No. 4, April 1984, pp. 384–387.
Chang, C. C., (1984b): An Ordered Minimal Perfect Hashing Scheme Based Upon Euler’s Theorem, Information Sciences, Vol. 32, No. 3, June 1984, pp. 165–172.
Cichelli, R. J., (1980): Minimal Perfect Hash Functions Made Simple, Communications of the Association for Computing Machinery, Vol. 23, No. 1, January 1980, pp. 17–19.
Cook, C. R. and Oldehoeft, R. R., (1982) : A Letter Oriented Minimal Perfect Hashing Function, SigpIan Notices, Vol. 17, No. 9, September 1982 , pp. 18–27.
Du, M. W., Hsieh, T. M., Jea, K. F. and Shieh, D. W., (1983): The Study of A New Perfect Hash Scheme, IEEE Transactions on Software Engineering, Vol. SE-9, No. 3, May 1983, pp. 305–313.
Ghosh, S. P., (1977): Data Base Organization for Data Management, Academic Press, New York, 1977, pp. 148–151.
Jaeschke, G., (1981): Reciprocal Hashing: A Method for Generating Minimal Perfect Hashing Functions, Communications of the Association for Computing Machinery, Vol. 24, No. 12, December 1981, pp. 829–833.
Knuth, D. E., (1973): The Art of Computer Programming, Vol. 3, Sorting and Searching, Addison-Wesley, Reading, Mass., U.S.A., 1973.
Maurer, W. D., (1968) : An Improved Hash Code for Scatter Storage, Communications of the Association for Computing Machinery, Vol. 11, No. 1, January, 1968, pp. 35–37.
Maurer, W. D. and Lewis, T. G., (1975) : Hash Table Method, Computing Surveys , Vol. 7, No. 1, March 1975, pp. 5–19.
Morris, R., (1968): Scatter Storage Techniques, Communications of the Association for Computing Machinery, Vol. 11, No. 1, January 1968, pp. 38–44.
Severance, D. G., (1974): Identifier Search Mechanisms: A Survey and Generalized Model, Computing Surveys, Vol. 6, No. 3, September 1974, pp. 175–194.
Sprugnoli, R., (1977): Perfect Hashing Functions: A Single-Probe Retrieving Method for Static Sets, Communications of the Association for Computing Machinery, Vol. 20, No. 11, November 1977, pp. 841–850.
Yang, W. P., Du, M. W. and Tsay, J. C., (1983): Single-Pass Perfect Hashing for Data Storage and Retrieval, Proceedings 1983 Conference on Information Sciences and Systems, Baltimore, Mayland, May 1983, pp. 470–476.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Plenum Press, New York
About this chapter
Cite this chapter
Chang, C.C. (1987). The Study of a Letter Oriented Minimal Perfect Hashing Scheme. In: Ghosh, S.P., Kambayashi, Y., Tanaka, K. (eds) Foundations of Data Organization. Springer, Boston, MA. https://doi.org/10.1007/978-1-4613-1881-1_7
Download citation
DOI: https://doi.org/10.1007/978-1-4613-1881-1_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4612-9048-3
Online ISBN: 978-1-4613-1881-1
eBook Packages: Springer Book Archive