A practitioner's guide to addressing algorithms
- 1 June 1976
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 19 (6), 314-326
- https://doi.org/10.1145/360238.360242
Abstract
This paper consolidates a number of popular rules of thumb which have been suggested for the design of record addressing algorithms, and discusses the applicability of these rules to large commercial databases. Guidelines for selecting identifier transformations, overflow techniques, loading factors, bucket sizes, and loading order are considered. Particular attention is focused on the reasonableness of common heuristics for determining primary or secondary bucket sizes. A mathematical model which explicitly considers storage device characteristics and time/space cost tradeoffs is used to analyze the effect of design parameters on overall system costs. A specific design example is presented and solved.Keywords
This publication has 5 references indexed in Scilit:
- Identifier Search Mechanisms: A Survey and Generalized ModelACM Computing Surveys, 1974
- Key-to-address transform techniquesCommunications of the ACM, 1971
- Random access file organization for indirectly addressed recordsPublished by Association for Computing Machinery (ACM) ,1969
- Scatter storage techniquesCommunications of the ACM, 1968
- Analysis of a file addressing methodCommunications of the ACM, 1962