Access Paths
15.2. Overview of Techniques to Implement Associative Access Paths
15.3. Associative Access by Hashing
15.3.1. Folding the Key Value into a Numerical Data Type
15.3.2. Criteria for a Good Hash Function
15.3.2.1. The Image Set of the Hashing Function
15.3.2.2. How to Find a Hash Function
15.3.2.3. Estimating the Probability of Page Overflows Due to Collisions
15.3.3. Overflow Handling in Hash Files
Get Transaction Processing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.