{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:54:51Z","timestamp":1742396091996},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573012"},{"type":"electronic","value":"9783540480471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57301-1_10","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T12:41:26Z","timestamp":1330260086000},"page":"146-163","source":"Crossref","is-referenced-by-count":6,"title":["Estimation of false drops in set-valued object retrieval with signature files"],"prefix":"10.1007","author":[{"given":"Hiroyuki","family":"Kitagawa","sequence":"first","affiliation":[]},{"given":"Yoshiaki","family":"Fukushima","sequence":"additional","affiliation":[]},{"given":"Yoshiharu","family":"Ishikawa","sequence":"additional","affiliation":[]},{"given":"Nobuo","family":"Ohbo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"issue":"No.2","key":"10_CR1","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/69.87960","volume":"1","author":"E. Bertino","year":"1989","unstructured":"E. Bertino and W. Kim, \u201cIndex Techniques for Queries on Nested Objects,\u201d IEEE Trans. Knowledge and Data Engineering, Vol. 1, No. 2, June 1989, pp. 196\u2013214.","journal-title":"IEEE Trans. Knowledge and Data Engineering"},{"key":"10_CR2","unstructured":"W. W. Chang and H. J. Scheck, \u201cA Signature Access Method for the Starburst Database System,\u201d Proc. 15th VLDB, Amsterdam, The Netherlands, August 1989, pp. 145\u2013153."},{"issue":"No.4","key":"10_CR3","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1145\/2275.357411","volume":"2","author":"C. Faloutsos","year":"1984","unstructured":"C. Faloutsos and S. Christdoulakis, \u201cAn Access Method for Documents and Its Analytical Performance Evaluation,\u201d ACM Trans. Office Information Systems, Vol. 2, No. 4, October 1984, pp. 267\u2013288.","journal-title":"ACM Trans. Office Information Systems"},{"issue":"No.3","key":"10_CR4","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/27641.28057","volume":"5","author":"C. Faloutsos","year":"1987","unstructured":"C. Faloutsos and S. Christdoulakis, \u201cDescription and Performance Analysis of Signature File Methods for Office Filing,\u201d ACM Trans. Office Information Systems, Vol. 5, No. 3, July 1987, pp. 237\u2013257.","journal-title":"ACM Trans. Office Information Systems"},{"key":"10_CR5","unstructured":"C. Fischer and S. Thomas, \u201cOperators for Non-First-Normal-Form Relations,\u201d Proc. IEEE COMPSAC 83, Chicago, November 1983, pp. 464\u2013475."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Y. Ishikawa, H. Kitagawa, and N. Ohbo, \u201cEvaluation of Signature Files as Set Access Facilities in OODBs,\u201d Proc. ACM SIGMOD 1993, Washington, D.C., May 1993, pp.247\u2013256.","DOI":"10.1145\/170035.170076"},{"key":"10_CR7","unstructured":"A. Kent, R. Sachs-Davis, and K. Ramamohanarao, \u201cA Superimposed Coding Schema Based on Multiple Block Descriptor Files for Indexing Very Large Data Bases,\u201d Proc. 14th VLDB, Los Angeles, August 1988, pp. 351\u2013359."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"H. Kitagawa and T. L. Kunii, \u201cThe Unnormalized Relational Data Model \u2014 For Office Form Processor Design,\u201d Springer-Verlag, 1989.","DOI":"10.1007\/978-4-431-68099-4"},{"key":"10_CR9","unstructured":"W. Kim, \u201cIntroduction to Object-Oriented Databases,\u201d Computer Systems Series, The MIT Press, 1990."},{"issue":"No.4","key":"10_CR10","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1145\/32204.32222","volume":"12","author":"R. Sacks-Davis","year":"1987","unstructured":"R. Sacks-Davis and A. Kent, \u201cMultikey Access Methods Based on Superimposed Coding Techniques,\u201d ACM Trans. Database Systems, Vol12, No. 4, December 1987, pp. 655\u2013698.","journal-title":"ACM Trans. Database Systems"},{"issue":"No.2","key":"10_CR11","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/0306-4379(86)90003-7","volume":"11","author":"H. Schek","year":"1986","unstructured":"H. Schek and M. Scholl, \u201cThe Relational Model with Relation-Valued Attributes,\u201d Information Systems, Vol. 11, No. 2, 1986, pp. 137\u2013147.","journal-title":"Information Systems"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"J. Stein and D. Maier \u201cAssociative Access Support in GemStone,\u201d in K. R. Dittrich, V. Dayal, and A. P. Buchmann (Eds.), On Object-Oriented Database Systems, Springer-Verlag, 1991, pp. 323\u2013339.","DOI":"10.1007\/978-3-642-84374-7_20"},{"key":"10_CR13","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1002\/asi.5090110209","volume":"11","author":"S. Stiassny","year":"1960","unstructured":"S. Stiassny, \u201cMathematical Analysis of Various Superimposed Coding Methods,\u201d American Documentation, Vol. 11, February 1960, pp. 155\u2013169.","journal-title":"American Documentation"},{"key":"10_CR14","unstructured":"K. F. Wong and M. H. Williams, \u201cA Superimposed Codeword Indexing Schema for Handling Sets in Prolog Databases,\u201d Proc. 2nd International Symposium on Database Systems for Advanced Applications, Tokyo, Japan, April 1991, pp. 468\u2013476."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"S. Zdonik and D. Maier, (Eds.), \u201cReadings in Object-Oriented Database Systems,\u201d Morgan Kaufmann Publishers, 1990.","DOI":"10.1145\/101620.101636"}],"container-title":["Lecture Notes in Computer Science","Foundations of Data Organization and Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57301-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:02:54Z","timestamp":1619571774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57301-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540573012","9783540480471"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-57301-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}