Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1978)
On random 2-3 trees Acta Inf
(1978)
The B * - tree search al - MARU 77 gortthm : a best - first proof procedure
R. Bayer, K. Unterauer (1977)
Prefix B-treesACM Trans. Database Syst., 2
D. Keehn, John Lacy (1974)
VSAM Data Set Design ParametersIBM Syst. J., 13
W. Maurer, T. Lewis (1975)
Hash Table MethodsACM Comput. Surv., 7
L. Guibas, E. McCreight, M. Plass, J. Roberts (1977)
A new representation for linear lists
R. Bayer, J. Metzger, München Germany (1975)
On the encipherment of search trees and random access files, 10
H. Clampett (1964)
Randomized binary searching with tree structuresCommun. ACM, 7
E. Organick (1972)
The multics system: an examination of its structure
Raymond Miller, N. Pippenger, A. Rosenberg, L. Snyder (1979)
Optimal 2, 3-TreesSIAM J. Comput., 8
(1972)
Symmetric binary B-Trees
E. Horowitz, S. Sahni (1984)
Fundamentals of Data Structures
Gerald Held, M. Stonebraker (1978)
B-trees re-examinedCommun. ACM, 21
R. Bayer (1971)
Binary B-trees for virtual memory
C. Foster (1965)
Information retrieval: information storage and retrieval using AVL trees
F. Rubin (1976)
Experiments in text file compressionCommun. ACM, 19
L. Guibas, R. Sedgewick (1978)
A dichromatic framework for balanced trees19th Annual Symposium on Foundations of Computer Science (sfcs 1978)
Mark Brown (1978)
A Storage Scheme for Height-Balanced TreesInf. Process. Lett., 7
E. McCreight (1977)
Pagination of B*-trees with variable-length recordsCommun. ACM, 20
K. Maruyama, S. Smith (1977)
Analysis of design alternatives for virtual memory indexesCommun. ACM, 20
A. Rosenberg, L. Snyder (1978)
Minimal-Comparison 2, 3-TreesSIAM J. Comput., 7
OS/VS Vwtual Storage Access Method (VSAM) logw, Order No. SY26-3841
(1976)
Algorithms + data structures ffi programs
A. Aho, J. Hopcroft, J. Ullman (1974)
The Design and Analysis of Computer Algorithms
B. Samadi (1976)
B-Trees in a System with Multiple UsersInf. Process. Lett., 5
Sakti Ghosh, M. Senko (1969)
File Organization: On the Selection of Random Access Index Points for Sequential FilesJ. ACM, 16
H. Wedekind (1974)
On the Selection of Access Paths in a Data Base System
R. Wagner (1973)
Indexing Design ConsiderationsIBM Syst. J., 12
(1974)
" VSAM data RECEIVED AUGUST 1978 ; FINAL REVISION ACCEPTED DECEMBER 1978 Ubiquitous BT r e e • 137 set design parameters
J. Nievergelt (1974)
Binary search trees and file organization
D. Knuth (1968)
The Art of Computer Programming
D. Severance (1974)
Identifier Search Mechanisms: A Survey and Generalized ModelACM Comput. Surv., 6
P. Karlton, S. Fuller, R. Scroggs, E. Kaehler (1976)
Performance of height-balanced treesCommun. ACM, 19
The Ubiquitous B-Tree DOUGLAS COMER Computer Sctence Department, Purdue Untverstty, West Lafayette, Indiana 47907 B-trees have become, de facto, a standard for file organization. File indexes of users, dedicated database systems, and general-purpose access methods have all been proposed and nnplemented using B-trees This paper reviews B-trees and shows why they have been so successful It discusses the major variations of the B-tree, especially the B+-tree, contrasting the relatwe merits and costs of each implementatmn. It illustrates a general purpose access method whmh uses a B-tree. Keywords and Phrases: B-tree, B*-tree, B+-tree, file organization, index CR Categorws: 3.73 3.74 4.33 4 34 INTRODUCTION The secondary storage facilities available on large computer systems allow users to store, update, and recall data from large collections of information called files. A computer must retrieve an item and place it in main memory before it can be processed. In order to make good use of the computer resources, one must organize files intelligently, making the retrieval process efficient. The choice of a good file organization depends on the kinds of retrieval to be performed. There are two broad classes of retrieval commands which can be illustrated by the following examples: Sequential: "From
ACM Computing Surveys (CSUR) – Association for Computing Machinery
Published: Jun 1, 1979
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.