{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:50:23Z","timestamp":1725663023660},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540095415"},{"type":"electronic","value":"9783540350101"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1979]]},"DOI":"10.1007\/3-540-09541-1_28","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T16:50:12Z","timestamp":1330188612000},"page":"193-227","source":"Crossref","is-referenced-by-count":3,"title":["A file organization suitable for relational database operations"],"prefix":"10.1007","author":[{"given":"Katsumi","family":"Tanaka","sequence":"first","affiliation":[]},{"given":"Chung","family":"Viet","sequence":"additional","affiliation":[]},{"given":"Yahiko","family":"Kambayashi","sequence":"additional","affiliation":[]},{"given":"Shuzo","family":"Yajima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,24]]},"reference":[{"unstructured":"Chamberlin, D.D., \"Relational Data Base Management Systems\", IBM Res. Rep., RJ1729, Feb. 1976","key":"8_CR1"},{"doi-asserted-by":"crossref","unstructured":"Chamberlin, D.D., Gray, J.N. and Traiger, I.L., \"Views, Authorization, and Locking in a Relational Data Base System\", Proc. AFIPS 1975 National Computer Conf., pp.425\u2013430, May 1975","key":"8_CR2","DOI":"10.1145\/1499949.1500032"},{"unstructured":"Codd, E.F., \"Recent Investigations into Relational Data Base Systems\", Proc. IFIP Congress 1974, pp.1017\u20131021, Aug. 1974","key":"8_CR3"},{"unstructured":"Codd, E.F., \"Further Normalization of the Data Base Relational Model\", Courant Compt. Sci. Symposia, pp.34\u201364, May 1971.","key":"8_CR4"},{"doi-asserted-by":"crossref","unstructured":"Astrahan, N.M., et al., \"System R: Relational Approach to Database Management\", ACM Trans. Database Systems, vol.1, no.2, June 1976.","key":"8_CR5","DOI":"10.1145\/320455.320457"},{"unstructured":"Haerder, T., \"An Implementation Technique for a Generalized Access Path Structure\", IBM Res. Rep., RJ1837, Oct. 1976","key":"8_CR6"},{"unstructured":"Date, C.J., \"An Introduction to Database Systems\", 2nd Ed. Addision Wesley, 1977","key":"8_CR7"}],"container-title":["Lecture Notes in Computer Science","Mathematical Studies of Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-09541-1_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:01:20Z","timestamp":1619557280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-09541-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1979]]},"ISBN":["9783540095415","9783540350101"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-09541-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1979]]}}}