{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T06:10:51Z","timestamp":1697955051888},"reference-count":5,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T00:00:00Z","timestamp":1160524800000},"content-version":"vor","delay-in-days":6523,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Networks"],"published-print":{"date-parts":[[1988,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>An algorithm for improving storage utilization for nonadaptive routing tables in point\u2010to\u2010point networks is presented. It allows storage vs. access time tradeoffs. The algorithm is quite general, and it can be used for other applications to improve storage in tree\u2010like structures. The algorithm was applied to the UUCP routing tables resulting in a threefold storage improvement.<\/jats:p>","DOI":"10.1002\/net.3230180402","type":"journal-article","created":{"date-parts":[[2007,5,12]],"date-time":"2007-05-12T01:52:32Z","timestamp":1178934752000},"page":"263-272","source":"Crossref","is-referenced-by-count":1,"title":["Efficient storage of nonadaptive routing tables"],"prefix":"10.1002","volume":"18","author":[{"given":"Udi","family":"Manber","sequence":"first","affiliation":[]},{"given":"Lawrence","family":"McVoy","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,11]]},"reference":[{"key":"e_1_2_1_2_2","volume-title":"The Design and Analysis of Computer Algorithms","author":"Aho A. V.","year":"1974"},{"key":"e_1_2_1_3_2","unstructured":"U.Manber Using Induction to Design Algorithms Technical report TR 88\u201024 Department of Computer Science University of Arizona May1988. To appear in Comm. ACM."},{"key":"e_1_2_1_4_2","volume-title":"Introduction to Algorithms\u2014A Creative Approach","author":"Manber U.","year":"1989"},{"key":"e_1_2_1_5_2","volume-title":"UNIX Programmer Manual","author":"Nowitz D. A.","year":"1983"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/6617.6618"}],"container-title":["Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnet.3230180402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/net.3230180402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T01:22:01Z","timestamp":1697937721000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/net.3230180402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,12]]},"references-count":5,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1988,12]]}},"alternative-id":["10.1002\/net.3230180402"],"URL":"https:\/\/doi.org\/10.1002\/net.3230180402","archive":["Portico"],"relation":{},"ISSN":["0028-3045","1097-0037"],"issn-type":[{"value":"0028-3045","type":"print"},{"value":"1097-0037","type":"electronic"}],"subject":[],"published":{"date-parts":[[1988,12]]}}}