An Indirect Chaining Method for Addressing on Secondary Keys

Methods for entering random access files on
the basis of one key are briefly surveyed.  The 
widely used chaining method, based on a pseudo-random
key transformation, is reviewed in more detail. 
 An efficient generalization of the chaining method
which permits recovery on additional keys is then 
presented.

CACM May, 1961

Johnson, L. R.

CA610502 JB March 16, 1978  11:13 PM

911	5	332
1271	5	332
1785	5	332
332	5	332
332	5	332
332	5	332
2543	5	332
2552	5	332
911	6	332
911	6	332
1785	6	332
1785	6	332
1786	6	332
1973	6	332
332	6	332
332	6	332
332	6	332
332	6	332
332	6	332
2107	6	332
2109	6	332
2203	6	332
492	6	332
492	6	332