{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T14:50:17Z","timestamp":1695739817243},"reference-count":13,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5844,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw: Pract. Exper."],"published-print":{"date-parts":[[1999,9]]},"DOI":"10.1002\/(sici)1097-024x(199909)29:11<931::aid-spe264>3.0.co;2-x","type":"journal-article","created":{"date-parts":[[2002,9,10]],"date-time":"2002-09-10T20:45:03Z","timestamp":1031690703000},"page":"931-941","source":"Crossref","is-referenced-by-count":1,"title":["On guards and symbol dependencies in substring search"],"prefix":"10.1002","volume":"29","author":[{"given":"Timo","family":"Raita","sequence":"first","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB1","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1002\/spe.4380240408","volume":"24","author":"Smith","year":"1994","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB2","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"Boyer","year":"1977","journal-title":"Communications of the ACM"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB3","first-page":"589","volume-title":"9th Annual Symposium on Theoretical Aspects of Computer Science","author":"Crochemore","year":"1992","unstructured":", , , , and , \u2018Speeding up two string-matching algorithms\u2019, in and (eds), 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, France, LNCS 577, Springer-Verlag, Berlin, 1992, pp. 589-600."},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB4","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1006\/jagm.1994.1008","volume":"16","author":"Colussi","year":"1994","journal-title":"Journal of Algorithms"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB5","author":"Hakonen","journal-title":"Acta Cybernetica"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB6","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1002\/spe.4380100608","volume":"10","author":"Horspool","year":"1980","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB7","doi-asserted-by":"crossref","first-page":"1221","DOI":"10.1002\/spe.4380211105","volume":"21","author":"Hume","year":"1991","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB8","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1002\/spe.4380211006","volume":"21","author":"Smith","year":"1991","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB9","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1002\/(SICI)1097-024X(199802)28:2<191::AID-SPE149>3.0.CO;2-2","volume":"28","author":"Liu","year":"1998","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB10","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1093\/comjnl\/15.4.308","volume":"15","author":"Wells","year":"1972","journal-title":"Computer Journal"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB11","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1002\/spe.4380221006","volume":"22","author":"Raita","year":"1992","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB12","volume-title":"Text Compression","author":"Bell","year":"1990","unstructured":"and , Text Compression, Prentice-Hall, 1990."},{"key":"10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X-BIB13","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1002\/spe.4380250703","volume":"25","author":"Lecroq","year":"1995","journal-title":"Software\u2014Practice and Experience"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1097-024X(199909)29:11%3C931::AID-SPE264%3E3.0.CO;2-X","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1097-024X(199909)29:11%3C931::AID-SPE264%3E3.0.CO;2-X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T08:25:34Z","timestamp":1625127934000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1097-024X(199909)29:11<931::AID-SPE264>3.0.CO;2-X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,9]]},"references-count":13,"journal-issue":{"issue":"11","published-print":{"date-parts":[[1999,9]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1097-024x(199909)29:11<931::aid-spe264>3.0.co;2-x","relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,9]]}}}