"Reciprocal Hashing: A Method for Generating Minimal Perfect Hashing Functions," Communications of the ACM, 12/81, vol. 24, No. 12, pp. 829-834. |
V. Y. Lum et al., "Key-to-Address Transform Techniques: A Fundamental Performance Study on Large Existing Formatted Files", Communications of the ACM, vol. 14, No. 4, Apr. 1971, pp. 228-239. |
W. D. Maurer, "An Improved Hash Code for Scutter Storage", Communications of the ACM, vol. 11, No. 1, Jan. 1968, pp. 35-38. |
G. Jaeschke, "Reciprocal Hashing: A Method for Generating Minimal Perfect Hashing Functions", Communications of the ACM, 12/81, vol. 24, pp. 829-833. |
J. D. Peterson, "Hashing for Disk File Storage", IBM Technical Disclosure Bulletin, vol. 21, No. 4, Sep. 1978, pp. 1669-1670. |
M. Davio, "Read-Only Memory Implementation of Discrete Functions", IEEE Transactions on Computers, vol. C-29, No. 10, Oct. 1980, pp. 931-934. |