2021
DOI: 10.37256/rrcs.1120211145
|View full text |Cite
|
Sign up to set email alerts
|

Linked List Elimination from Hashing Methods

Abstract: Hashing has been used for decades in many fields such as encryption, password verification, and pattern search. Hash systems consist mainly of three components: the hash function, the hash table, and the linked lists that are attached to the hash table. One of the major benefits of using a hash function is reduction in the runtime of the hash-based software systems. However, their linked lists are a major source of time consumption. In this paper, an innovative method is proposed to remove all the linked lists… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 11 publications
(13 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?