{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:05:40Z","timestamp":1725663940523},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540584353"},{"type":"electronic","value":"9783540487968"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58435-8_223","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:09:48Z","timestamp":1330254588000},"page":"571-580","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The HS file: A new dynamic signature file method for efficient information retrieval"],"prefix":"10.1007","author":[{"given":"Jae Soo","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Yoon -Joon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jae Woo","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Myoung Ho","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,3]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"J. W. Chang, J. H. Lee and Y. J. Lee, \u201cMultikey Access Methods Based on Term Discrimination and Signature Clustering,\u201d ACM SIGIR, 1989, pp. 176\u2013185.","DOI":"10.1145\/75335.75353"},{"issue":"No.2","key":"59_CR2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TSE.1984.5010223","volume":"SE-10","author":"S. Christodoulakis","year":"1984","unstructured":"S. Christodoulakis and C. Faloutsos, \u201cDesign Considerations for a Message File Server,\u201d IEEE Trans. on Soft. Eng., Vol. SE-10, No. 2, Mar. 1984, pp. 201\u2013210.","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"U. Deppisch, \u201cS-tree: A Dynamic Balanced Signature Index for Office Retrieval,\u201d ACM SIGIR, 1986, pp. 77\u201387.","DOI":"10.1145\/253168.253189"},{"issue":"No.3","key":"59_CR4","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/27641.28057","volume":"5","author":"C. Faloutsos","year":"1987","unstructured":"C. Faloutsos and S. Christodoulakis, \u201cDescription and Performance File Method for Office Filing,\u201d ACM TOIS, Vol. 5, No. 3, 1987, pp. 237\u2013257.","journal-title":"ACM TOIS"},{"issue":"No.1","key":"59_CR5","first-page":"25","volume":"13","author":"C. Faloutsos","year":"1990","unstructured":"C. Faloutsos, \u201cSignature-based Text Retrieval Methods: A Survey,\u201d IEEE Computer Society Technical Committee on Data Engineering, Vol. 13, No. 1, Mar. 1990, pp. 25\u201332.","journal-title":"IEEE Computer Society Technical Committee on Data Engineering"},{"issue":"No.3","key":"59_CR6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1109\/69.142018","volume":"4","author":"Z. Lin","year":"1992","unstructured":"Z. Lin and C. Faloutsos, \u201cFrame-Sliced Signature Files,\u201d IEEE Trans. on Knowledge and Data Engineering, Vol. 4, No. 3, Jun. 1992, pp. 281\u2013289.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"59_CR7","doi-asserted-by":"crossref","first-page":"1624","DOI":"10.1109\/PROC.1979.11543","volume":"67","author":"C. S. Roberts","year":"1979","unstructured":"C. S. Roberts, \u201cPartial Match Retrieval via the Method of the Superimposed Codes,\u201d Proc. IEEE 67, Dec. 1979, pp. 1624\u20131642.","journal-title":"Proc. IEEE"},{"issue":"No.4","key":"59_CR8","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1145\/32204.32222","volume":"12","author":"R. Sacks-Davis","year":"1987","unstructured":"R. Sacks-Davis and K. Ramamohanarao, \u201cMultikey Access Methods based on Superimposed Coding Techniques,\u201d ACM TODS, Vol. 12, No. 4, Dec. 1987, pp. 655\u2013696.","journal-title":"ACM TODS"},{"issue":"No.2","key":"59_CR9","first-page":"179","volume":"E76-D","author":"J. S. Yoo","year":"1993","unstructured":"J. S. Yoo, J. W. Chang, Y-J Lee and M. H. Kim, \u201cPerformance Evaluation of Signature-Based Access Mechanisms for Efficient Information Retrieval,\u201d IEICE Trans. on Information and Systems, Vol. E76-D, No. 2, Feb. 1993, pp. 179\u2013183.","journal-title":"IEICE Trans. on Information and Systems"},{"issue":"No.4","key":"59_CR10","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1145\/119311.119313","volume":"9","author":"P. Zezula","year":"1991","unstructured":"P. Zezula, F. Rabitti and P. Tiberio, \u201cDynamic Partitioning of Signature Files,\u201d ACM TOIS, Vol. 9, No. 4, Oct. 1991, pp. 336\u2013369.","journal-title":"ACM TOIS"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58435-8_223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T08:33:10Z","timestamp":1558254790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58435-8_223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540584353","9783540487968"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-58435-8_223","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"3 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}