Next:
Permission check
Up:
Algorithms
Previous:
Overload
 
Contents
Hash table
The used hash function will be the lower byte of the inode number of the executable.
Biondi Philippe 2000-12-15