Method and device for adding, searching and deleting hash table

A hash table and hash technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problem of limited storage resources, occupying more storage resources, and difficulty in greatly improving the utilization efficiency of hash tables, etc. problems, to achieve the effect of improving utilization efficiency

Inactive Publication Date: 2012-01-11
COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the hash table under the software structure, as long as the processor has enough processing power, the above methods are easy to implement; but for the hash table under the traditional hardware structure, no matter increasing the number of hash buckets or increasing the number of each hash bucket The maxi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for adding, searching and deleting hash table
  • Method and device for adding, searching and deleting hash table
  • Method and device for adding, searching and deleting hash table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0052] Firstly, the data structure of the hash table involved in the following embodiments of the present invention is introduced.

[0053] Such as figure 1 As shown, the hash table is a hash table under the hardware structure. The numbers in the boxes in the figure represent the hash addresses, the circles represent each node in the linked list,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for adding, searching and deleting a hash table. The method for adding a hash table comprises the following steps of: extracting keywords of data to be added; performing hash operation on the keywords to obtain a hash address and a hash fingerprint; judging whether a corresponding target storage position is occupied according to the hash address; when the target storage position is occupied, searching for an unoccupied idle storage position from the hash table, and judging whether an occupied node at the target storage position is a first node of a bidirectional linked list; if so, adding a target node at the idle storage position according to the hash fingerprint, and linking the target node to the tail of the bidirectional linked list where the occupied node is positioned; and otherwise, moving the occupied node to the idle storage position, linking the occupied node to the tail of the bidirectional linked list where the occupied node is positioned, and adding a target node at the target storage position to constitute a single-node bidirectional linked list according to the hash fingerprint,. According to the method and the device, the utilization efficiency of the hash table and the utilization ratio of a storage space can be increased.

Description

technical field [0001] The invention relates to a method and device for adding, searching and deleting a hash table, and belongs to the technical field of data processing. Background technique [0002] Hash Table (Hash Table), also known as hash table, is a data structure that is directly accessed according to the data key value (Key Value). A traditional hash table usually includes multiple hash buckets with a certain bucket depth, and each hash bucket contains an element whose address obtained after hashing points to the bucket. In order to make the hash table achieve the desired utilization rate in the presence of conflicts, the number of hash buckets is usually increased to reduce the collision rate, and the maximum bucket depth of each hash bucket is increased to increase the tolerance for collisions . [0003] For the hash table under the software structure, as long as the processor has enough processing power, the above methods are easy to implement; but for the has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 孙云刚孙才陈曦
Owner COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products