Recent questions tagged hashing

0 votes
0 answers
98
0 votes
1 answer
103
0 votes
0 answers
104
How does data encryption affect index schemes ? In particular, how might it affect schemes that attempt to store data in sorted order ?
0 votes
1 answer
105
0 votes
1 answer
107
What are the causes of bucket overflow in a hash file organization ? What can be done to reduce the occurrence of bucket overflows ?
0 votes
1 answer
108
Explain the distinction between closed and open hashing. Discuss the relative merits of each technique in database applications.
0 votes
0 answers
109
For multiplication method in hashing the formula is h(k)=m* (KA mod 1);m=2^p, k=key , 0<A<1My question is how does it actually works.Please explain in a detailed way.
1 votes
1 answer
110
Consider an open address hash table with uniform hashing. Out of 10 locations, 8 are occupied. What are the expected number of probes in an unsuccessful and successful se...
0 votes
1 answer
111
Consider the hashing table with 'm' slots and 'n' keys. If the expected number of probes in unsuccessful search is 3. The expected number of probes in a successful search...
0 votes
0 answers
119
A) (1-(N / K)) ^ r b) (1-(K / N)) ^ r c) (1+(N / K)) ^ r-1 d) (1-(K / N)) ^ r-1
0 votes
1 answer
120
How to solve such kind of questions ? Can anybody tell what's is the concept behind this ?? someone provide me link so that I read it and understand the actual concept