Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

General performance analysis of key-to-address transformation methods using an abstract file concept

Published: 01 October 1973 Publication History

Abstract

This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file are assumed to have been selected from the key space according to a certain probabilistic selection algorithm. All files with the same number of keys selected from this key space will be suitably weighted in accordance with the algorithm, and the average performance of the transformation methods on these files will be used as the potential of these methods. Using this analysis, methods with the same overall performance can be classified and key distributions partial to certain transformations can be identified. All this can be done analytically. The approach is applied to a group of transformation methods using files whose keys are selected randomly.

References

[1]
Lum, V.Y., Yuen, P.S.T. and Dodd, M. Key-to-address transform techniques: a fundamental performance study on large existing formatted files. Comm. ACM 14, 4(Apr. 1971), 228-239.
[2]
Buchholz, W. File organization and addressing, lBM Syst. J. 2(1963), 86-111.
[3]
Lin, A.D. Key addressing of random access memories by radix transformation. Proc. AFIPS 1963 SJCC, Vol. 24, Spartan Books, New York, pp. 355-366.
[4]
Schay, G., and Raver, N. A method for key-to-address transformation IBM J. Res. Dev. 7, 2 (Apr. 1963), 121-129.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 16, Issue 10
Oct. 1973
115 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/362375
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1973
Published in CACM Volume 16, Issue 10

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. direct addressing
  2. hash coding
  3. hashing
  4. hashing analysis
  5. hashing methods
  6. hashing techniques
  7. information retrieval
  8. key transformation
  9. key-to-address transformation
  10. random access
  11. randomization performance analysis
  12. randomizing
  13. scatter storage

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)89
  • Downloads (Last 6 weeks)22
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media