Arnab Chakraborty has Published 4293 Articles

Asymmetric Hashing in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 11-Aug-2020 06:18:11

292 Views

In this section we will see what is Asymmetric Hashing technique. In this technique, the hash table is split into d number of blocks. Each split is of length n/d. The probe value xi, 0 ≤ i ≤ d, is drawn uniformly from $$\lbrace\frac{i*n}{d}, ..., \frac{(i+1)*n}{d-1}\rbrace$$. As with multiple choice ... Read More

Balanced binary search trees in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:38:24

988 Views

Here we will see what is the balanced binary search tree. The binary search trees (BST) are binary trees, who has lesser element at left child, and greater element at right child.The average time complexity for searching elements in BST is O(log n). It is depending on the height of ... Read More

Brent’s Method in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:36:38

688 Views

In this section we will see what is Brent’s Method related to open addressed hashing. This method is a heuristic. This attempts to minimize the average time for a successful search in a hash table.This method was originally applying on double hashing technique, but this can be used on any ... Read More

Double Hashing in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:34:18

4K+ Views

In this section we will see what is Double Hashing technique in open addressing scheme. There is an ordinary hash function h´(x) : U → {0, 1, . . ., m – 1}. In open addressing scheme, the actual hash function h(x) is taking the ordinary hash function h’(x) when ... Read More

Quadratic Probing in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:32:46

7K+ Views

In this section we will see what is quadratic probing technique in open addressing scheme. There is an ordinary hash function h’(x) : U → {0, 1, . . ., m – 1}. In open addressing scheme, the actual hash function h(x) is taking the ordinary hash function h’(x) and ... Read More

Linear Probing in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:30:50

8K+ Views

In this section we will see what is linear probing technique in open addressing scheme. There is an ordinary hash function h´(x) : U → {0, 1, . . ., m – 1}. In open addressing scheme, the actual hash function h(x) is taking the ordinary hash function h’(x) and ... Read More

Hashing with Open Addressing in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:28:41

3K+ Views

In this section we will see what is the hashing by open addressing. The open addressing is another technique for collision resolution. Unlike chaining, it does not insert elements to some other data-structures. It inserts the data into the hash table itself. The size of the hash table should be ... Read More

Hashing with Chaining in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:27:25

7K+ Views

In this section we will see what is the hashing with chaining. The Chaining is one collision resolution technique. We cannot avoid collision, but we can try to reduce the collision, and try to store multiple elements for same hash value.this technique suppose our hash function h(x) ranging from 0 ... Read More

Universal Hashing in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:26:23

847 Views

For any hash function we can say that if the table size m is much smaller than universe size u, then for any hash function h, there is some large subset of U that has the same hash value.To get rid of this problem, we need a set of hash ... Read More

Hashing by Multiplication in Data Structure

Arnab Chakraborty

Arnab Chakraborty

Updated on 10-Aug-2020 09:24:06

1K+ Views

Here we will discuss about the hashing with multiplication method. For this we use the hash function −ℎ(𝑥) = ⌊𝑚𝑥𝐴⌋ 𝑚𝑜𝑑 𝑚Here A is a real-valued constant. The advantage of this method is that the value of m is not so critical. We can take m as power of 2 ... Read More

Advertisements