Database Reference
In-Depth Information
Figure A2-9. UML Diagram for the TreeMap Class
A2.5 Summary and Concluding Remarks
Let us summarize what we have covered in this chapter:
A hash function takes a key value, applies an algorithm to
determine its location.
The hash function maps key values from a relatively large domain
to a relatively smaller range of address locations. Because of this,
collision may occur and must be resolved.
Among the commonly used hashing techniques are absolute
addressing, direct table lookup, division-remainder, mid-square,
folding, and truncation.
Three commonly used collision resolution strategies are linear
probing, synonym chaining, and rehashing.
In linear probing, consecutive address locations are checked until
a free location is found for insertion, or the sought item is found.
 
Search WWH ::




Custom Search