Declaration: images and content based on www.bilibili.com/video/BV1uT…

An overview of hash tables

 

 

 

 

 

 

The hash function

 

 

 

Direct addressing

 

Divisor remainder method

 

 

 

Numerical analysis method

 

 

 

Square the middle

 

Folding method

 

A method to deal with conflicts — open addressing

Linear detection method

 

 

 

 

 

Secondary detection method

 

Random detection method

 

Methods to Deal with Conflicts — Zipper method (Chain Address Method)

 

 

 

Performance analysis of hash lookup

 

Summary of Search techniques

 

Binary search: www.cnblogs.com/gonghr/p/14…

Binary sort tree: www.cnblogs.com/gonghr/p/14…

Balanced binary tree: www.cnblogs.com/gonghr/p/14…