Solved

Implementations of hashing with linear and quadratic probing, double hashing and hashing with chaining

Posted on 2004-10-01
9
1,210 Views
Last Modified: 2011-09-20


Dear Expert,

This is my first time to try your website, so I hope I can find answers for my questions.
I'm looking for good implementations for hashing with linear and quadratic probing, double hashing and hashing with chaining. This is because I have to generate random numbers "Integers"and hash them into the table using each of the hashing methods I just mentioned. I also need to coutn the number of insertion, deletion, monitoring the load factor, and do other stuff. The only thing that I need to do all this is a good implementations for hashing with linear and quadratic probing, double hashing and hashing with chaining. I know I I can calculate the number of insertions, deletions, elc. I just want to start with good implementations of the methods I just mentioned. thanks a lot.
I need to have the implementations in C++.
0
Comment
Question by:jawadobaid
  • 3
  • 2
9 Comments
 
LVL 30

Accepted Solution

by:
Axter earned 250 total points
ID: 12206721
0
 
LVL 86

Assisted Solution

by:jkr
jkr earned 250 total points
ID: 12207799
http://www.nist.gov/dads/termsImpl.html has some good resources about that.
0
 

Author Comment

by:jawadobaid
ID: 12599206
This question has been closed.
Thanks.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:jawadobaid
ID: 12599207
This question has been closed.
Thanks.
0
 
LVL 30

Expert Comment

by:Axter
ID: 12599252
>>This question has been closed.

Can you please award the points so that the question can be properly closed?
0
 
LVL 30

Expert Comment

by:Axter
ID: 12599269
You might want to take a look at the EE Grading policy.

http://www.experts-exchange.com/help.jsp#hi73
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Using Delphi code in a Builder project that uses a DLL 3 110
C++ dll will not run on machine without VS installed 10 80
c++ syntax question 9 44
Beginner to Unreal Engine 4 5 60
Introduction This article is a continuation of the C/C++ Visual Studio Express debugger series. Part 1 provided a quick start guide in using the debugger. Part 2 focused on additional topics in breakpoints. As your assignments become a little more …
Basic understanding on "OO- Object Orientation" is needed for designing a logical solution to solve a problem. Basic OOAD is a prerequisite for a coder to ensure that they follow the basic design of OO. This would help developers to understand the b…
The viewer will learn how to clear a vector as well as how to detect empty vectors in C++.
The viewer will be introduced to the member functions push_back and pop_back of the vector class. The video will teach the difference between the two as well as how to use each one along with its functionality.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now