References
[1]. Aspnes, J. (2015). Notes on Data Structures and Programming Techniques. New Haven: Yale U. CPSC 223, Spring 2015, Yale University.
[2]. Coffman, E. G. J., & Eve, J. (1970). File structures using hashing functions. Communications of the ACM, 13(7), 427-432.
[3]. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2001). Introduction to Algorithms. MIT Press.
[4]. Danker, S., Ayers, R., & Mislan, R. P. (2009). Hashing Techniques for Mobile Device Forensics. Small Seate Digital Forensics Journal, 3(1), 1-6.
[5]. Devillers, R., & Louchard, G. (1979). Hashing techniques, a global approach. BIT Numerical Mathematics, 19(3), 302-311.
[6]. Harrison, G. (2016, March). The Database Technologies of the Future. Database Trends and Applications. Retrieved from http://www.dbta.com/ Authors/Guy-Harrison-3539.aspx
[7]. Hash Tables. (2016). Data Structures and Algorithms. Tutorials Point (I) Pvt. Ltd.
[8]. Horowitz, E., Sahni, S., & Rajasekaran, S. (2008). Fundamentals of Computer Algorithms, Second Ed. New Delhi, India.
[9]. Nemes, R. M. (1992). U.S. Patent No. 5,121,495. Washington, DC: U.S. Patent and Trademark Office.
[10]. Rathi, A., Lu, H., & Hedrick, G. E. (1991). Performance comparison of extendible hashing and linear hashing techniques. ACM SIGSMALL/PC Notes, 17(2), 19-26.
[11]. Singh, M., & Garg, D. (2009, March). Choosing best hashing strategies and hash functions. In Advance Computing Conference, 2009. IACC 2009. IEEE International (pp. 50-55). IEEE.
[12]. Srivastava, S. K., & Srivastava, D. (2003). Data Structures through C in depth. BPB Publications.
[13]. Vlajic, & Natalija, (2003). COSC 2011: Fundamentals of Data Structures. Department of Computer Science, York University.
[14]. Wang, J., Kumar, S., & Chang, S. F. (2012). Semi-supervised hashing for large-scale search. IEEE Transactions on Pattern Analysis & Machine Intelligence, 12(2012), 2393-2406.
[15]. Wolfson, H. J., & Rigoutsos, I. (1997). Geometric hashing: An overview. IEEE Computational Science and Engineering, 4(4), 10-21.