Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 10
Page 328
... hash algorithm , we have no more control over which sections of bulk storage will contain which records . In particular , if we were to use the divide - by - 40 algo- rithm previously presented and if the numeric interpretation of the ...
... hash algorithm , we have no more control over which sections of bulk storage will contain which records . In particular , if we were to use the divide - by - 40 algo- rithm previously presented and if the numeric interpretation of the ...
Page 331
... hash algorithm being used but rather results in the use of some general - purpose algorithm provided by the software system . For this reason it is often advantageous to forgo the convenience of established hash systems and develop ...
... hash algorithm being used but rather results in the use of some general - purpose algorithm provided by the software system . For this reason it is often advantageous to forgo the convenience of established hash systems and develop ...
Page 476
... hash algorithm to place the people in the group into one of 365 categories . The hash algorithm , of course , is the calculation of one's birthday . The amazing thing is that only 23 people are required before the probability is in ...
... hash algorithm to place the people in the group into one of 365 categories . The hash algorithm , of course , is the calculation of one's birthday . The amazing thing is that only 23 people are required before the probability is in ...
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array assign binary bit patterns block bulk storage called Carol Chapter COBOL concept contains current entry Current Pointer data control block data flow diagram database declare search deleted diagram disk employee example execution Figure FILLED-BY FORTRAN hashed head pointer hexadecimal identify implemented input insertion sort instruction integer linked list loop machine language machine's memory main memory memory cells modified module move notation operating system password perform pivot entry problem produce program counter programming languages pseudocode Questions/Exercises queue record relation represented request result retrieve routines schedule search a failure search a success search tree sequence sequential file solution solving stack statement step storage system stored string subprogram syntax tape target value task technique terminal time-sharing translator Turing machine