Key points are not available for this paper at this time.
This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file are assumed to have been selected from the key space according to a certain probabilistic selection algorithm. All files with the same number of keys selected from this key space will be suitably weighted in accordance with the algorithm, and the average performance of the transformation methods on these files will be used as the potential of these methods. Using this analysis, methods with the same overall performance can be classified and key distributions partial to certain transformations can be identified. All this can be done analytically. The approach is applied to a group of transformation methods using files whose keys are selected randomly.
Building similarity graph...
Analyzing shared references across papers
Loading...
Vincent Y. Lum (Mon,) studied this question.
www.synapsesocial.com/papers/6a07ee5509b3c820153787a9 — DOI: https://doi.org/10.1145/362375.362385
Vincent Y. Lum
Communications of the ACM
IBM (United States)
Building similarity graph...
Analyzing shared references across papers
Loading...