1971
DOI: 10.1145/362919.362934
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of the substring test by hashing

Abstract: A technique is described for implementing the test which determines if one string is a substring of another. When there is low probability that the test will be satisfied, it is shown how the operation can be speeded up considerably if it is preceded by a test on appropriately chosen hash codes of the strings. . This work was done under AEC contract number AT (30-1) 1480 V.This note describes a fast implementation of the test which determines if one string contains a specified substring. The scheme makes use o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0
1

Year Published

1972
1972
2017
2017

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 87 publications
(25 citation statements)
references
References 2 publications
0
24
0
1
Order By: Relevance
“…As a result, signature file methods have been proposed for applications for which these structures occur, such as prolog databases. Signature file methods have been proposed for multikey retrieval (Roberts, 1979;Sacks-Davis & Ramamohanarao, 1983;Sacks-Davis, 1985), text retrieval (Faloutsos & Christodoulakis, 1985;Faloutsos, 1985;Harrison, 1971) prolog systems (Colomb, 1985;Ramamohanarao & Shepherd, 1986;Wada, Morita, Yamazaki, Yamashita, Miyazaki, & Itoh, 1987;Wise & Powers, 1984), office systems Faloutsos & Christodoulakis, 1987;Rabitti & Zizka, 1984), statistical databases (Wong, Liu, Olken, Rotem, & Wong, 1985), and filtering methods (Bloom, 1970;McIiroy, 1982). Signature file methods are well suited to hardware implementation (Al!en et al, 1986;Berra et al, 1987).…”
Section: Introductionmentioning
confidence: 99%
“…As a result, signature file methods have been proposed for applications for which these structures occur, such as prolog databases. Signature file methods have been proposed for multikey retrieval (Roberts, 1979;Sacks-Davis & Ramamohanarao, 1983;Sacks-Davis, 1985), text retrieval (Faloutsos & Christodoulakis, 1985;Faloutsos, 1985;Harrison, 1971) prolog systems (Colomb, 1985;Ramamohanarao & Shepherd, 1986;Wada, Morita, Yamazaki, Yamashita, Miyazaki, & Itoh, 1987;Wise & Powers, 1984), office systems Faloutsos & Christodoulakis, 1987;Rabitti & Zizka, 1984), statistical databases (Wong, Liu, Olken, Rotem, & Wong, 1985), and filtering methods (Bloom, 1970;McIiroy, 1982). Signature file methods are well suited to hardware implementation (Al!en et al, 1986;Berra et al, 1987).…”
Section: Introductionmentioning
confidence: 99%
“…Harrison 41 introduced the notion of signatures for locating a passage of text containing a given keyword. In advance of any queries, the text is preprocessed, building a signature (based on n-grams) for each convenient block of text, such as a line.…”
Section: Figure 5 the Second Scanning Test: Hashed N-gram Lookup Thmentioning
confidence: 99%
“…A signature is some encoding of the salient structural features of an object to provide an economical test of whether t matches s. Signatures have been used to enhance searching in text-editors [9].…”
Section: Signaturesmentioning
confidence: 99%
“…As will be explained in the following sections, we use "hashing" techniques in a variety of ways [8,9]: to characterize features of patterns and structures to be matched, so as to decrease the number of matches to be attempted; and to store and retrieve only a single unique copy of any structure, decreasing A template is an arbitrary object "t" used to represent a class of objects. A template is a generator of a set of object strings S={s}, each element, "s", of which is formed by replacing the marker(s) in "t" by arbitrary object(s); we say "t generates s".…”
mentioning
confidence: 99%