1991
DOI: 10.1145/125187.125200
|View full text |Cite
|
Sign up to set email alerts
|

Order-preserving minimal perfect hash functions and information retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
31
0

Year Published

1992
1992
2013
2013

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(33 citation statements)
references
References 5 publications
2
31
0
Order By: Relevance
“…Related work also includes research on order-preserving hashing [5] [11]. However, protecting the hash values from cryptanalysis is not the concern of this body of work.…”
Section: Related Workmentioning
confidence: 99%
“…Related work also includes research on order-preserving hashing [5] [11]. However, protecting the hash values from cryptanalysis is not the concern of this body of work.…”
Section: Related Workmentioning
confidence: 99%
“…We make this assumption without loss of generality because any value can be transformed to a real number using a hash function. For example, in the case of a string value, the order-preserving hash functions proposed by Fox et al [8] can be exploited.…”
Section: The Form Of Data Streamsmentioning
confidence: 99%
“…This is the environment that we consider here. [6,7]; this allows the vocabulary to remain compact (indeed, the words need not be stored at all), but a non-trivial amount of memory space is required for the description of the hash function, approximately 2-4 bits per key, and two disk accesses will still be required per query term if the address table is stored on disk.…”
Section: Document Databasesmentioning
confidence: 99%