Database Reference
In-Depth Information
Figure A2-5. Converting Alphanumeric Keys to Numeric
A2.3 Collision Resolution
As mentioned earlier, when hash functions are applied, collisions are likely to occur.
Three collision resolution techniques are prevalent: linear probing , synonym chaining ,
and rehashing .
A2.3.1 Linear Probing
The linear probing strategy prescribes that whenever a collision occurs, the empty
location that is closest to the hash address is found and used. If the end of the table is
reached, wrap-around is allowed. Figure A2-6 illustrates this. In the figure, collision has
been resolved for nodes D, E, and G.
Figure A2-6. Illustrating Linear Probing
 
Search WWH ::




Custom Search