참고문헌
- Brad Miller, David Ranum. Problem Solving with Algorithms and Data Structures (September 2013)
- Michael T. Goodrich, Roberto Tamassia and David M. Mount. Data Structures and Algorithms in C++ (Second Edition) 2009
- Rance D. Necaise. Data Structures and Algorithms Using Python. 2011
- Narasimha Karumanchi. Data Structures And Algorithms Made Easy 2017
- Hans Peter Luhn. 1953. A new method of recording and searching information. American Documentation 4, 1 (1953), 14-16 https://doi.org/10.1002/asi.5090040104
- Paul E. Black, "coalesced chaining", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed. 12 February 2019. (accessed 09-06-2021) Available from: https://www.nist.gov/dads/HTML/coalescedChaining.html
- Pagh, Rasmus and Flemming Friche (2004). Cuckoo hashing. "Journal of Algorithms"
- Jane Rubel A. Jeyaraj, Sundarakantham Kambaraj and Velmurugan Dharmarajan (2018). High-speed data deduplication using Parallelized Cuckoo Hashing. "Turkish Journal of Electrical Engineering & Computer Sciences".
- B. K. Debnath, S. Sengupta, and J. Li (2010). "Chunkstash: Speeding up inline storage deduplication using flash memory". Proc. USENIX Annual Technical Conference.
- A. Kirsch and M. Mitzenmacher, "The power of one move: Hashing schemes for hardware" IEEE/ACM Transactions on Networking, vol. 18, no. 6, pp. 1752?1765, 2010. https://doi.org/10.1109/TNET.2010.2047868
- Y. Hua, B. Xiao, and X. Liu (2013) "Nest: Locality-aware approximate query service for cloud computing" Proceedings of the 32nd IEEE International Conference on Computer Communications(INFOCOM), pp. 1327-1335.
- Dhar, S., Pandey, K., Premalatha, M., and Suganya, G. (2017). A tree based approach to improve traditional collision avoidance mechanisms of hashing. 2017 International Conference on Inventive Computing and Informatics (ICICI). doi:10.1109/icici.2017.8365368
- Arvind K. Sharma ; S.K. Mittal (2019). Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review. 2019 Third International Conference on Inventive Systems and Control (ICISC).
- Knuth, Donald E. (2000). Sorting and searching (2. ed., 6. printing, newly updated and rev. ed.). Boston [u.a.]: Addison-Wesley. p. 514. ISBN 978-0-201-89685- 5.
- Weiss, Mark Allen (2009). Data Structures and Algorithm Analysis in C++. Pearson Education. ISBN 978-81-317-1474-4.
- Phillip G.Bradford and Michael N. Katehakis (April 2007), "A Probabilistic Study on Combinatorial Expanders and Hashing", SIAM Journal on Computing, 37 (1): 83-111, doi:10.1137/S009753970444630X
- Xuewen Wang, Xiaoqing Ding and Changsong Liu (2001). "Character extraction and recognition in natural scene images", Sixth International Conference on Document Analysis and Recognition.