Skip to main content
Log in

Linear open addressing and Peterson's theorem rehashed

  • Scientific Notes
  • Published:
BIT Numerical Mathematics Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Ole Amble and Donald E. Knuth,Ordered hash tables, Computer Journal, Vol. 17, No. 2. pp. 135; 142, May 1974. Also Computer Science Dept. Report STAN-CS-73-367, Stanford Univ., June 1973.

    Google Scholar 

  2. Richard P. Brent,Reducing the retrieval time of scatter storage techniques, CACM, Vol. 16, No. 2, pp. 105–109, February 1998

    Google Scholar 

  3. Gary D. Knott,Hashing functions, Computer Journal, Vol. 18, No. 3, pp. 265–278, Aug. 1975.

    Google Scholar 

  4. Gary D. Knott,Direct-chaining with coalescing lists, J. Algorithms, Vol. 4, No. 1, pp. 3–27, Dec. 1984.

    Google Scholar 

  5. Donald E. Knuth,The Art of Computer Programming, Vol. 3:Searching and Sorting, Addison-Wesley, Reading, Mass., 1973.

  6. Donald E. Knuth,Computer science and its relation to mathematics, Amer. Math. Monthly, Vol. 81, No. 4, pp. 323–343, April 1974.

    Google Scholar 

  7. Alan G. Konheim and Benjamin Weiss,An occupancy discipline and applications, SIAM J. of Applied Mathematics, Vol. 14, No. 6, pp. 1266–1274, November 1966.

    Google Scholar 

  8. J. Kral,Some properties of the scatter storage technique with linear probing, Computer Journal, Vol. 14, No. 2, pp. 145–149, May 1971.

    Google Scholar 

  9. W. Wesley Peterson,Addressing for Random Access Storage, IBM J. of Research and Development, Vol. 1, No. 2, pp. 130–146, April 1957.

    Google Scholar 

  10. Ronald L. Rivest,Optimal Arrangement of Keys in a Hash Table, JACM, Vol. 25, No. 2, pp. 200–209, April 1978, also M.I.T. Lab for Computer Science Report MIT/LCS/TM-73, July 1976.

    Google Scholar 

  11. Jeffrey D. Ullman,A note on the efficiency of hashing functions, JACM, Vol. 19, No. 3, pp. 569–575, July 1972, alsoThe design of hashing functions, EE Dept. Tech. Report, No. 85, Princeton University, 1970. This work is also discussed in [5].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Knott, G.D. Linear open addressing and Peterson's theorem rehashed. BIT 28, 364–371 (1988). https://doi.org/10.1007/BF01934101

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01934101

CR categories

Keywords

Navigation