Solved

Implementations of hashing with linear and quadratic probing, double hashing and hashing with chaining

Posted on 2004-10-01
9
1,209 Views
Last Modified: 2011-09-20


Dear Expert,

This is my first time to try your website, so I hope I can find answers for my questions.
I'm looking for good implementations for hashing with linear and quadratic probing, double hashing and hashing with chaining. This is because I have to generate random numbers "Integers"and hash them into the table using each of the hashing methods I just mentioned. I also need to coutn the number of insertion, deletion, monitoring the load factor, and do other stuff. The only thing that I need to do all this is a good implementations for hashing with linear and quadratic probing, double hashing and hashing with chaining. I know I I can calculate the number of insertions, deletions, elc. I just want to start with good implementations of the methods I just mentioned. thanks a lot.
I need to have the implementations in C++.
0
Comment
Question by:jawadobaid
  • 3
  • 2
9 Comments
 
LVL 30

Accepted Solution

by:
Axter earned 250 total points
ID: 12206721
0
 
LVL 86

Assisted Solution

by:jkr
jkr earned 250 total points
ID: 12207799
http://www.nist.gov/dads/termsImpl.html has some good resources about that.
0
 

Author Comment

by:jawadobaid
ID: 12599206
This question has been closed.
Thanks.
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:jawadobaid
ID: 12599207
This question has been closed.
Thanks.
0
 
LVL 30

Expert Comment

by:Axter
ID: 12599252
>>This question has been closed.

Can you please award the points so that the question can be properly closed?
0
 
LVL 30

Expert Comment

by:Axter
ID: 12599269
You might want to take a look at the EE Grading policy.

http://www.experts-exchange.com/help.jsp#hi73
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

This article will show you some of the more useful Standard Template Library (STL) algorithms through the use of working examples.  You will learn about how these algorithms fit into the STL architecture, how they work with STL containers, and why t…
Go is an acronym of golang, is a programming language developed Google in 2007. Go is a new language that is mostly in the C family, with significant input from Pascal/Modula/Oberon family. Hence Go arisen as low-level language with fast compilation…
The goal of the video will be to teach the user the concept of local variables and scope. An example of a locally defined variable will be given as well as an explanation of what scope is in C++. The local variable and concept of scope will be relat…
The goal of the video will be to teach the user the difference and consequence of passing data by value vs passing data by reference in C++. An example of passing data by value as well as an example of passing data by reference will be be given. Bot…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now