Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.1 6/24/83; site ames-lm.UUCP
Path: utzoo!linus!decvax!harpo!seismo!hao!hplabs!menlo70!ames-lm!jaw
From: jaw@ames-lm.UUCP (James A. Woods)
Newsgroups: net.unix-wizards
Subject: Original 'dbm' author -- Ken Thompson
Message-ID: <154@ames-lm.UUCP>
Date: Tue, 14-Feb-84 23:18:23 EST
Article-I.D.: ames-lm.154
Posted: Tue Feb 14 23:18:23 1984
Date-Received: Thu, 16-Feb-84 05:56:48 EST
Organization: NASA-Ames Research Center, Mtn. View, CA
Lines: 18

#
     He confided this to me at the January Uniforum conference.  We were
discussing chess programming, which is really the motivation for much of his
UNIX work. 

     For a veiled reference to this access method, consult the November,
1982 Bell System Technical Journal, part 2, papers on database work at
Bell Labs.  Thompson's independently developed scheme, not mentioned by name,
was compared with a B-tree method as well as another dynamic hashing
algorithm.

     What I could use is a way of employing this external hashing buddy system 
for full-text searching applications.  Multiple (and duplicate) keys would
need to be accommodated here.  The method of choice so far seems to be
inverted files (c.f. Lesk's 'hunt' and 'inv' code).  Retrieving arbitrary
information in two disk seeks is something to behold.

			-- James A. Woods  (hao!ames-lm!jaw)