, , , . , , . /. , , , , .
, , , , , , , , . .
, , . ( ):

- :

:

radix, , . , , , . -, ( , ), . ( ), ( /, ), .
, ( , ), , , , , , , , , , .
, , , , , , , , , , , . , , .
I never found the need to go that far. I just do generalized sorting against entity identifiers from time to time in order to generally improve access patterns of all systems (but without an optimal solution for any given system). Your use case may require an optimal version, but I would suggest just focusing on key systems with big hot spots that really benefit from this.