1,213 research outputs found

    Comparison of scatter storage techniques using an analysis of variance model

    Get PDF
    An analysis of variance model is developed to determine if a significant difference exists between various scatter storage techniques. The model is a two-factor hierarchical mixed design with each combination of transformation and search method considered as a treatment. The data used in the analysis is obtained from a computer program which provides statistics on the number of probes needed to load the (k+l)st item into a table for the different treatments. An ANOVA table was then computed for various load factors. A significant difference among the treatments was detected for load factors above .4. Comparison of individual treatments using Tukey\u27s multiple range test shows that although some treatments are significantly inferior, most treatments are not significantly different in terms of the average number of probes needed to load an item --Abstract, page ii

    Data structures for set manipulation- hash table, 1986

    Get PDF
    The most important issue addressed in this thesis is the efficient implementation of hash table methods. There are credential trade-offs in a desired implement ion. These are discussed in issues such as hash addressing, handling collision, hash table layout., and bucket overflow problems. The criteria of good hash function is providing even distribution. Collision is the major problem in hash table methods. Two major hashtable methods are discussed. Open Addressing Method places the synonymous items somewhere within the table. The Chaining Method, however, chains all synonymies and stores them somewhere outside the table called overflow area. Hash table is widely used by system software as an ideal data structure. Hash Table -applications canbe found in compiler's symbol table, database, directories of file organizations, as well as in problem-solving application programs

    An experimental approach to the prediction of retrieval timme using inverted and sequential search techniques for files stored on the disk packs of an IBM OS/360 MOD 50

    Get PDF
    In the course of designing file organization systems, comparing packaged generalized file processing systems, or when evaluating alternative hardware/ soft/ware configurations, it is often desirable to have a good estimate of system performance before committing large expenditure a of money and manpower

    Advanced Computer Program Models : A Talking Textbook Based on Three Languages

    Get PDF
    The purpose of this dissertation was to develop a learning instrument, to be used by programmers preparing for the Data Processing Management Association Test as a self study book, or by college business programming and computer science students who have completed a course in data processing and a course in programming a higher level language. The mathematical ability requirement was minimized by developing the algorithms in parallel with the programs. The learner should experience _emphasis in the following .areas: l. The type of activities required to pass the DPMA test (the programming part) 2. Data Structures 3. Fortran (at the level of the DPMA test) I 4. RPG (at the level of the DPMA test) 5. Flow chart reading and writing Fortran and RPG (Report Program Generator) languages were used, since their proficiency is required for the DPMA test; however a subset of IBM Basic Assembler language was used, because the author believed that a person who is more than superficially interested in computers should demonstrate a proficiency with a machine language. An important part of this method of presentation are the cassette recordings which allow the learner to progress outside the classroom. The recordings plus the hard copy of the actual programs, diminished in size, give the learner material which he can move to any location and study without the presence of the instructor

    Indirect key derivation schemes for key management of access hierarchies

    Get PDF
    In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, because it is based on hashed message authentication codes (HMACs) built from a fast, single, dedicated hash function (SHA-1). It is intended to provide an efficient indirect key management method for large access hierarchies resembling tree structures. We are able to achieve better tree traversals using a technique we created called path addressing. Our path addressing scheme allows us to efficiently calculate relationships between security classes, determine traversal paths, and improve the performance of indirect key derivation. We also present our cached key update scheme which is meant to improve the indirect key derivation schemes on tree hierarchies by delaying key updates when changes to the structure of the access hierarchy are necessary, but the re-calculation and re-assignment of keys would either be costly or inconvenient. For access hierarchies represented as weakly/strongly connected directed acyclic graphs, we suggest modifications to our path addressing and key derivation scheme which could allow our HMAC-method to be appplied to these types of hierarchies. Along the way, we discuss various current key management methods and discuss certain pragmatic issues that can arise which affect the applicability and implementation of a key management method
    • …
    corecore