Summary
Basic hashing schemes
Separate chaining
Open adressing
Linear probing
Double hashing
Choosing the hash function
Fingerprinting
Bloom filters
Previous slide
Next slide
Back to first slide
View graphic version