Solved

About Btree+ o Btree*

Posted on 1998-11-04
5
539 Views
Last Modified: 2007-10-18
Is there any theoretical information that you are familiar with and that I can have that would explain in a fine detail the implementation of a Btree+ or a Btree* and a good hashing function that goes with it ?. The object is to develop a database scheme in order not to use an existing one. The hashing function must be almost perfect (without collitions)
0
Comment
Question by:i900013649
  • 2
  • 2
5 Comments
 
LVL 7

Expert Comment

by:Motaz
ID: 1215929
There is no hashing function without collition. The collition is the most advantage of hashing method.

Motaz
0
 

Author Comment

by:i900013649
ID: 1215930
Let me just add a comment. My plan is to implement each node of this Btree+ as a colection of elements, and every one of these elements would have a string and a its hashed value, so that when I do my binary search on a node to look for the actual string I will be looking the hashed value not the string in order to make it run faster.
So even though I am storing the string value on each element of the nodes, I want to store also its hashed value so that when I do the looking up, I will go for the value(this way, my search will run faster).
If you look at this from my point of view, having collitions just mess everything up !!!
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 1215931
Why not just make a separate index?
0
 

Author Comment

by:i900013649
ID: 1215932
Well, Sir. It looks like I am never going to get an answer. So you are going to have to forgive me if I just quit answering questions. Thanks any way !!!
0
 
LVL 5

Accepted Solution

by:
scrapdog earned 100 total points
ID: 1215933
btree question / pascal


http://osf1.gmu.edu/~mince/cc.htm    [has implementations in C++]
http://www.cs.uow.edu.au/people/nabg/ABC/ABC.html   [contains a postscript document]
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Creating a blank copy of a TClientDataSet 1 1,146
Client Data Set - Wide Memo 6 1,731
Neural Networks with Delphi 3 1,535
Pascal equivalent of VB Select/case 3 339
Large Outlook files lead to various unwanted errors and corruption issues. Furthermore, large outlook files can also make Outlook take longer to start-up, search, navigate, and shut-down. So, In this article, i will discuss a method to make your Out…
Note: This is the third blog post in a series on email clearinghouses (https://www.xmatters.com/alert-management/blog-email-has-failed-us?utm_campaign=70138000000ydLoAAI&utm_source=exex&utm_medium=article&utm_content=blog-post).   We’ve been talki…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now