{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:10:58Z","timestamp":1725567058767},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540280613"},{"type":"electronic","value":"9783540318064"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11533719_46","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T13:34:13Z","timestamp":1127828053000},"page":"450-460","source":"Crossref","is-referenced-by-count":1,"title":["Randomized Quicksort and the Entropy of the Random Source"],"prefix":"10.1007","author":[{"given":"Beatrice","family":"List","sequence":"first","affiliation":[]},{"given":"Markus","family":"Maucher","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Sch\u00f6ning","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Schuler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","unstructured":"Alon, N., Rabin, M.O.: Biased coins and randomized algorithms. In: Preparata, F.P., Micali, S. (eds.) Advances in Computing Research 5, pp. 499\u2013507. JAI Press (1989)"},{"key":"46_CR2","volume-title":"Information Theory","author":"R.B. Ash","year":"1965","unstructured":"Ash, R.B.: Information Theory. Dover, New York (1965)"},{"key":"46_CR3","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00453-001-0046-2","volume":"31","author":"L. Devroye","year":"2001","unstructured":"Devroye, L.: On the probabilistic worst-case time of \u201cFIND\u201d. Algorithmica\u00a031, 291\u2013303 (2001)","journal-title":"Algorithmica"},{"issue":"1","key":"46_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1093\/comjnl\/5.1.10","volume":"5","author":"C.A.R. Hoare","year":"1962","unstructured":"Hoare, C.A.R.: Quicksort. Computer Journal\u00a05(1), 10\u201315 (1962)","journal-title":"Computer Journal"},{"key":"46_CR5","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1145\/174130.174132","volume":"40","author":"H.J. Karloff","year":"1993","unstructured":"Karloff, H.J., Raghavan, P.: Randomized algorithms and pseudorandom numbers. Journal of the Association for Computing Machinery\u00a040, 454\u2013476 (1993)","journal-title":"Journal of the Association for Computing Machinery"},{"key":"46_CR6","series-title":"Sorting and Searching","volume-title":"The Art of Computer Programming","author":"D. Knuth","year":"1973","unstructured":"Knuth, D.: The Art of Computer Programming. Sorting and Searching, vol.\u00a03. Addison-Wesley, Reading (1973)"},{"key":"46_CR7","unstructured":"List, B.: Probabilistische Algorithmen und schlechte Zufallszahlen. PhD thesis, Universit\u00e4t Ulm (1999)"},{"key":"46_CR8","doi-asserted-by":"crossref","DOI":"10.1515\/9780691206844","volume-title":"Pseudorandomness and Cryptographic Applications","author":"M. Luby","year":"1996","unstructured":"Luby, M.: Pseudorandomness and Cryptographic Applications. Princeton University Press, Princeton (1996)"},{"key":"46_CR9","volume-title":"Computational Complexity","author":"C.H. Papadimitriou","year":"1994","unstructured":"Papadimitriou, C.H.: Computational Complexity. Addison-Wesley, Reading (1994)"},{"key":"46_CR10","volume-title":"Analysis of Algorithms","author":"R. Robert Sedgewick","year":"1994","unstructured":"Robert Sedgewick, R., Flajolet, P.: Analysis of Algorithms. Addison-Wesley, Reading (1994)"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Santha, M., Vazirani, U.V.: Generating quasi-random sequences from slightly random sources. In: Proceedings of the 25th IEEE (1984)","DOI":"10.1109\/SFCS.1984.715945"},{"key":"46_CR12","unstructured":"Tompa, M.: Probabilistic Algorithms and Pseudorandom Generators. Lecture Notes (1991)"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11533719_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T22:36:46Z","timestamp":1586471806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11533719_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280613","9783540318064"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11533719_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}