hash table


Also found in: Dictionary, Thesaurus, Medical, Legal, Wikipedia.
Related to hash table: Hash function

hash table

hash table

A lookup table that is designed to efficiently store non-contiguous keys (account numbers, part numbers, etc.) that may have wide gaps in their alphabetic or numeric sequences.

Hash tables are created with an algorithm that stores the keys into hash buckets, which contain key-value pairs. Since different keys may hash to the same bucket, the goal of hash table design is to spread out the key-value pairs evenly with each bucket containing as few key-value pairs as possible. When an item is looked up, its key is hashed to find the appropriate bucket, and the bucket is then compared to find the right key-value pair. See key-value pair, cryptographic hash function, DHT and hash total.


A Hash Table
When an item is looked up, its key is hashed into a bucket value, and the bucket is compared to find the key.
References in periodicals archive ?
This design bypasses the hash table and efficiently utilizes the network as we need only one RDMA Read for reading an item.
In Cheng, distributed hash tables (DHT) were used for inter routing connection establishment where the internal regions of the network router were connected with common mode point.
The basic working principle of our proposed INFA-HTS algorithm is that we first use INFA (Improved Nondeterministic Finite Automaton) to capture the related primitive events from an out-of-order RFID event stream, and then, we utilize HTS (Hash Table Structure) to store and process the large intermediate detection result; last, we use the hash table searching technology to output the complex event sequences.
Each hash table, denoted as HT, is indeed a link array with [m.
Dynamic hash table is usually double the number of slot growth after the conflict, while hashing function has changed after growth, so elements of the old slot should be reposition; this realization method is the principles of "hash_map" function in the standard library.
It uses a two-level hash table for attempting to join stream tuples as soon as they arrive, and uses a partition-based waiting area for other stream tuples.
The maximum size of the hash table that could be used was 28, which means [2.
Hash table structure of line-station stores the relationship of lines and stations.
However, attack code might access the data structures below this level of API (for example, using the hash table get and put methods or even using lower-level memory-accessing capabilities at the native code level).
Observing that the hash table size used by EH-Apriori affects the cardinality of [C.
Each prefix P1 to P7 is placed in a separate hash table (shown vertically using a dashed line) by length.
The program runs on an IBM PC or clone, with 486 33 or 50 Mhz, and has a 32K hash table.