chapter 4: BitManipulation

4.1 Linear Probing

4.2 Quadratic Probing

4.3 Double Hashing

4.4 Seperate Chaining