Adaptive hashing with signatures
نویسندگان
چکیده
Adaptive hashing with signatures combines the adaptive hashing file structure together with superimposed signatures and several new algorithms to produce a new order-preserving data structure. This new technique has excellent direct retrieval performance, localized index organizations, and improved file index balance. In keeping with the principle advantage of the original adaptive hashing technique, algorithms to improve both primary and secondary memory storage utilization are also discussed. Furthermore, the new data structure has a high degree of flexibility, allowing it to be tailored for the optimum performance versus storage utilization ratio for a given application. Section 1: Introduction Several papers in the literature combine the idea of record signatures with dynamic file hashing methods to improve the performance of these data structures. In [1], Larson describes a technique using signatures and separators with linear hashing which guarantees retrieval of a record in a single probe. The use of signatures and separators is described in [2] and [3] and is referred to as signature hashing in [4]. A similar idea using signature hashing with dynamic hashing is presented in both [5] and [6]. Work in the general area of using signatures to improve retrieval performance continues, as in [7] which discusses an optimum distribution of signatures for signature hashing methods in general. Hsiao and Tharp’s original adaptive hashing data structure and algorithms are presented in [8]. Adaptive hashing was introduced as an alternative data structure to order-preserving linear hashing (OPLH) [9] and the B+-tree [10]. A comparison of the advantages and disadvantages of adaptive hashing, bounded disorder, and B+-trees can be found in [11]. All of these data structures share the property that both sequential and direct access of data records can be performed in an efficient manner. Adaptive hashing's main advantage over the B+-tree is that it requires less primary
منابع مشابه
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
This paper presents some theoretical and experimental results about off-line/on-line digital signatures. The goal of this type of schemes is to reduce the time used to compute a signature using some kind of preprocessing. They were introduced by Even, Goldreich and Micali and constructed by combining regular digital signatures with efficient one-time signatures. Later Shamir and Tauman presente...
متن کاملDigital Signature with Hashing and XML Signature patterns
Data security has become one of the most important concerns for organizations. Information is a valuable asset and needs to be protected. One important countermeasure against attackers is the use of digital signatures. Digital signatures provides message authentication and may also provide message integrity. We present here two patterns: XML Signature and Digital Signature with Hashing patterns...
متن کاملSignature File Hashing Using Term Occurrence and Query Frequencies
Signature files act as a filter on retrieval to discard a large number of non-qualifying data items. Linear hashing with superimposed signatures (LHSS) provides an effective retrieval filter to process queries in dynamic databases. This study is an analysis of the effects of reflecting the term occurrence and query frequencies to signatures in LHSS. This approach relaxes the unrealistic uniform...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملStructure-Preserving Smooth Projective Hashing
Smooth projective hashing has proven to be an extremely useful primitive, in particular when used in conjunction with commitments to provide implicit decommitment. This has lead to applications proven secure in the UC framework, even in presence of an adversary which can do adaptive corruptions, like for example Password Authenticated Key Exchange (PAKE), and 1-out-of-m Oblivious Transfer (OT)....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Syst.
دوره 18 شماره
صفحات -
تاریخ انتشار 1993