A Survey on Efficient Hashing Techniques in Software Configuration Management
نویسنده
چکیده
This paper presents a survey on efficient hashing techniques in software configuration management scenarios. Therefore it introduces in the most important hashing techniques as open hashing, separate chaining and minimal perfect hashing. Furthermore we evaluate those hashing techniques utilizing large data sets. Therefore we compare the hash functions in terms of time to build the data structure, performing only successful lookups and performing only unsuccessful lookups. The results indicate that minimal perfect hashing clearly outperforms the other presented hashing techniques.
منابع مشابه
Utilizing Strategic Management Accounting Techniques in Iranian Firms
The main objective of this article is to describe and explain the utilization of Strategic Management Accounting Techniques (SMATs) in Iranian various firms. For this, a survey was carried out using questionnaires provided for the seventy-five Chief Executive Officers in productive and services firms. Data gathered from respondents about the usage rate of SMATs based on the five-point Likert sc...
متن کاملEfficient and scalable geometric hashing method for searching protein 3D structures
As the structural databases continue to expand, efficient methods are required to search similar structures of the query structure from the database. There are many previous works about comparing protein 3D structures and scanning the database with a query structure. However, they generally have limitations on practical use because of large computational and storage requirements. We propose two...
متن کاملSecure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major is...
متن کاملLearning to Hash for Indexing Big Data - A Survey
The explosive growth in big data has attracted much attention in designing efficient indexing and search methods recently. In many critical applications such as large-scale search and pattern matching, finding the nearest neighbors to a query is a fundamental research problem. However, the straightforward solution using exhaustive comparison is infeasible due to the prohibitive computational co...
متن کاملObjects Identification in Object-Oriented Software Development - A Taxonomy and Survey on Techniques
Analysis and design of object oriented is onemodern paradigms for developing a system. In this paradigm, there are several objects and each object plays some specific roles. Identifying objects (and classes) is one of the most important steps in the object-oriented paradigm. This paper makes a literature review over techniques to identify objects and then presents six taxonomies for them. The f...
متن کامل