TITLE

Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries

AUTHOR(S)
Chang, C.C.; Lee, R.C.T.; Du, M.W.
PUB. DATE
May 1982
SOURCE
IEEE Transactions on Software Engineering;May82, Vol. 8 Issue 3, p235
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this paper. we shall show that the symbolic Gray code hashing mechanism is not only good for best matching, but also good for partial match queries. Essentially, we shall propose a new hashing scheme, called bucket-oriented symbolic Gray code, which can be used to produce any arbitrary Cartesian product file, which has been shown to be good for partial match queries. Many interesting properties of this new multiattribute hashing scheme, including the property that it is a perfect hashing scheme, have been discussed and proved.
ACCESSION #
14419887

 

Related Articles

  • Hyper Hasher.  // Network Dictionary;2007, p234 

    An encyclopedia entry about "Hyper Hasher" is presented. It is a shareware program developed by Matt LaPlante. Its objective is to allow the use to compute digital files hashes and checksums in more formats than any other computer program.

  • On the File Design Problem for Partial Match Retrieval. Du, Hung-Chang // IEEE Transactions on Software Engineering;Feb85, Vol. 11 Issue 2, p213 

    In the past two decades, the increasing usage of databases and integrated information systems has encouraged the development of file structures suited for partial match retrieval. A partial match query is a query with some number of attributes specified and the rest of them unspecified. One...

  • A FUZZY HASHING APPROACH BASED ON RANDOM SEQUENCES AND HAMMING DISTANCE. Breitinger, Frank; Baler, Harald // Proceedings of the Conference on Digital Forensics, Security & L;2012, p89 

    Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves...

  • Rotational attack on Luffa hash function. LI Yun-qiang; ZHAO Tu-hua; CAO Jin-ke // Application Research of Computers / Jisuanji Yingyong Yanjiu;Dec2013, Vol. 30 Issue 12, p3807 

    This paper studied the capacity of resisting rotational attack of Luffa hash function. Through analyzing characteristics of Luffa permutation, it defined the rotational pair of Luffa permutation, gave the influence of basic word transformations to rotational relation, proved that the AND...

  • Technolog. GRAHAM-SMITH, DARIEN // PC Pro;Feb2014, Issue 232, p009 

    The author discusses the convenience of using short user identification (ID) when logging on to computer systems. He agrees that a standard with a consistent format can help in the creation of unique IDs. He explains the use of a hashing algorithm for turning characters into mathematical figures...

  • Digest Authentication.  // Network Dictionary;2007, p147 

    A definition of the term "Digest Authentication" is presented. It refers to a computer security system that allows a Web client to compute MD5 hashes of the password to prove that it has the password.

  • An Efficient Certificate Revocation and Verification Scheme from Multi-Hashing. Mengbo Hou; Qiuliang Xu; Fengbo Lin // Journal of Computers;Jun2012, Vol. 7 Issue 6, p1437 

    Even though Public Key Infrastructure (PKI) and X.509 certificate has been a prominent security model for a variety of e-commerce applications and large scale distributed computing, it has not been sufficiently investigated in the certificate revocation and verification mechanism. In this paper,...

  • Choose your installation drive. Vines, Rose // Australian PC User;Nov2011, Vol. 23 Issue 11, p74 

    The article presents tips on how to manage files in the computer stored in various drives. It mentions that each program installed in automatically stored in C: drive because the operating system and applications by treat default treat C: drive as their natural home. It provides instructions on...

  • help station: COVER CD TUTORIAL. Booth, Angela // Australian PC User;Jul2004, Vol. 16 Issue 7, p100 

    Presents the features and operational procedure of the StickyNote 8.0 computer program for organizing notes. Options in creating notes; Customization of sticky notes and alarms; Management of StickyNote files using the Manager feature.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics