Home → Magazine Archive → May 1961 (Vol. 4, No. 5) → An indirect chaining method for addressing on secondary... → Abstract

An indirect chaining method for addressing on secondary keys

By L. R. Johnson

Communications of the ACM, Vol. 4 No. 5, Pages 218-222

Save PDF
Methods for entering random-access files on the basis of one key are briefly surveyed. The widely used chaining method, based on a pseudo-random key transformation, is reviewed in more detail. An efficient generalization of the chaining method which permits recovery on additional keys is then presented.

The full text of this article is premium content


No entries found