Author of the publication

Improved Overflow Handling with Linear Hashing.

, and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 165-173. World Scientific, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Overflow Handling with Linear Hashing., and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 165-173. World Scientific, (1991)Inverted signature trees and text searching on CD-ROMs., and . Inf. Process. Manag., 25 (2): 161-169 (1989)An introduction to computed chaining., and . AFIPS National Computer Conference, volume 49 of AFIPS Conference Proceedings, page 275-282. AFIPS Press, (1980)A Comparison of Computed Chaining to Predictors., and . IEEE Trans. Software Eng., 12 (8): 870-874 (1986)Augmented Transition Networks as a Design Tool for Personalized Data Base Systems.. SIGIR, page 2-13. ACM, (1978)A Microcomputer System for Processing Natural Languages., and . IEEE Trans. Pattern Anal. Mach. Intell., 4 (2): 221-223 (1982)The CD-ROM Foster a New Sata Structure: the B3-tree., and . ACM Conference on Computer Science, page 466-471. ACM, (1993)Tridirectional Computed Chaining: An Efficient Hashing Algorithm for Limited Space Applications., and . COMPSAC (1), page 381-387. IEEE Computer Society, (2005)Getting more oomph from programming exercises.. SIGCSE, page 91-95. ACM, (1981)Gray Code Chaining: A High Performance Hashing Algorithm for Limited Storage Applications., and . ITNG, page 1014. IEEE Computer Society, (2007)