In this section we discuss several hashing methods. In the following discussion, we assume that we are dealing with integer-valued keys, i.e., . Furthermore, we assume that the value of the hash function falls between 0 and M-1.