B-tree with fixed node size and no minimum degree In anti-virus and anti-spyware applications, due to multiplicative increase in processing times with increasing complexity of detection logic and fast growing number of signatures, there is a necessity for data structures for quick retrieval and efficient storage of large collection of signatures. This paper presents a variant of B-tree data structure, where the minimum degree constraint is relaxed while maintaining the order of worst case performance bounds for primitive search, insert and delete operations of the B-tree. It presents a detailed case study of the impact of key(signature) size on storage utilization, given fixed sized nodes and also derives a maximum optimal key size with res...
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11532)We revisit self-adjust...
We revisit self-adjusting external memory tree data structures, which combine the optimal (and pract...
There is a common problem of operating on hash values of elements of some database. In this paper th...
We present dynamic search-tree data structures that perform well in the setting of a hierarchical me...
AbstractThe paper studies balanced trees with variable length records. It generalizes the concept of...
AbstractWe consider the problem of building optimal binary search trees. The binary search tree is a...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
B-trees are the data structure of choice for maintaining searchable data on disk. However, B-trees p...
It is shown how a highly compact representation of binary trees can be used as the basis of two acce...
Search tree data structures like van Emde Boas trees are a theoretically attractive alternative to c...
Binary search trees used as a data structure for rapid access to stored data. Arrays, vectors and li...
A binary split tree is a search structure combining features of heaps and binary search trees. The f...
B-trees are the data structure of choice for maintaining searchable data on disk. However, B-trees p...
Submitted by Elaine Almeida (elaine.almeida@nce.ufrj.br) on 2017-08-04T13:14:30Z No. of bitstreams:...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2006.This electronic v...
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11532)We revisit self-adjust...
We revisit self-adjusting external memory tree data structures, which combine the optimal (and pract...
There is a common problem of operating on hash values of elements of some database. In this paper th...
We present dynamic search-tree data structures that perform well in the setting of a hierarchical me...
AbstractThe paper studies balanced trees with variable length records. It generalizes the concept of...
AbstractWe consider the problem of building optimal binary search trees. The binary search tree is a...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
B-trees are the data structure of choice for maintaining searchable data on disk. However, B-trees p...
It is shown how a highly compact representation of binary trees can be used as the basis of two acce...
Search tree data structures like van Emde Boas trees are a theoretically attractive alternative to c...
Binary search trees used as a data structure for rapid access to stored data. Arrays, vectors and li...
A binary split tree is a search structure combining features of heaps and binary search trees. The f...
B-trees are the data structure of choice for maintaining searchable data on disk. However, B-trees p...
Submitted by Elaine Almeida (elaine.almeida@nce.ufrj.br) on 2017-08-04T13:14:30Z No. of bitstreams:...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2006.This electronic v...
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11532)We revisit self-adjust...
We revisit self-adjusting external memory tree data structures, which combine the optimal (and pract...
There is a common problem of operating on hash values of elements of some database. In this paper th...