{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:13:55Z","timestamp":1725664435754},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540628682"},{"type":"electronic","value":"9783540690313"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-62868-1_117","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T17:53:34Z","timestamp":1330278814000},"page":"250-271","source":"Crossref","is-referenced-by-count":0,"title":["Predicates and superimposed coding: An application to image recognition"],"prefix":"10.1007","author":[{"given":"Bernd-J\u00fcrgen","family":"Falkowski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"key":"26_CR1","unstructured":"Chang, W.W., and Schek, H.J. A Signature Access Method for the Starburst Database System. In Proceedings of the 15th International Conference on VLDB (Amsterdam, Aug. 1989), pp. 145\u2013153"},{"issue":"2","key":"26_CR2","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/130226.145014","volume":"11","author":"P. Ciaccia","year":"1993","unstructured":"Ciaccia, P., and Zezula, P. Estimating Accesses in Partitioned Signature File Organizations. ACM Trans. Inf. Syst., 11, 2, (April 1993), pp. 133\u2013142","journal-title":"ACM Trans. Inf. Syst."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Deppisch, U. S-tree: A dynamic balanced signature index for office retrieval. In Proceedings of the ACM Conference on Research and Development in Information Retrieval Pisa, (Sept. 8\u201310, 1986), pp. 77\u201387","DOI":"10.1145\/253168.253189"},{"issue":"4","key":"26_CR4","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0893-6080(94)00107-W","volume":"8","author":"B.-J. Falkowski","year":"1995","unstructured":"Falkowski, B.-J. Probabilistic Perceptrons. Neural Networks, 8, 4, (1995), pp. 513\u2013523","journal-title":"Neural Networks"},{"issue":"4","key":"26_CR5","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1145\/2275.357411","volume":"2","author":"C. Faloutsos","year":"1984","unstructured":"Faloutsos, C., and Christodoulakis, S. Signature files: An access method for documents and its analytical performance evaluation. ACM Trans. Off. Inf. Syst., 2, 4, (1984), pp. 267\u2013268","journal-title":"ACM Trans. Off. Inf. Syst."},{"issue":"3","key":"26_CR6","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/27641.28057","volume":"5","author":"C. Faloutsos","year":"1987","unstructured":"Faloutsos, C., and Christodoulakis, S. Description and performance analysis of signature file methods for office filing. ACM Trans. Off. Inf, Syst., 5, 3, (1987), pp. 237\u2013257","journal-title":"ACM Trans. Off. Inf, Syst."},{"issue":"1","key":"26_CR7","first-page":"25","volume":"13","author":"C. Faloutsos","year":"1990","unstructured":"Faloutsos, C. Signature-based text retrieval methods: A survey. In IEEE Computer Society Technical Committee on Data Engineering. Special issue on document retrieval, 13, 1, (March 1990), pp. 25\u201332","journal-title":"IEEE Computer Society Technical Committee on Data Engineering. Special issue on document retrieval"},{"key":"26_CR8","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/BF00962238","volume":"3","author":"C. Faloutsos","year":"1994","unstructured":"Faloutsos, C., Barber, R., Flickner, M., Hafner, J., Niblack, W., and Petkovic, D. Efficient and Effective Querying by Image Content. J. of Intelligent Information Systems, 3, (1994), pp. 231\u2013262","journal-title":"J. of Intelligent Information Systems"},{"key":"26_CR9","volume-title":"Analysis 1","author":"O. Forster","year":"1980","unstructured":"Forster, O. Analysis 1. Vieweg & Sohn, Braunschweig, Wiesbaden, (1980)"},{"key":"26_CR10","volume-title":"Probability","author":"J.R. Gray","year":"1967","unstructured":"Gray, J.R. Probability. Oliver & Boyd, Edinburgh and London, (1967)"},{"key":"26_CR11","volume-title":"The Art of Computer Programming, Vol. I, Fundamental Algorithms","author":"D.E. Knuth","year":"1973","unstructured":"Knuth, D.E. The Art of Computer Programming, Vol. I, Fundamental Algorithms, Reading, MA: Addison-Wesley, (1973)"},{"key":"26_CR12","volume-title":"The Art of Computer Programming, Vol. III Sorting and Searching","author":"D.E. Knuth","year":"1973","unstructured":"Knuth, D.E. The Art of Computer Programming, Vol. III Sorting and Searching, Reading MA: Addison-Wesley, (1973)"},{"issue":"2","key":"26_CR13","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1145\/65935.65937","volume":"7","author":"D.L. Lee","year":"1989","unstructured":"Lee, D.L., and Leng, C. Partitioned signature files: Design issues and performance evaluation. ACM Trans. Inf. Syst. 7, 2, (April 1989), pp. 158\u2013180","journal-title":"ACM Trans. Inf. Syst."},{"key":"26_CR14","unstructured":"Minsky, M.L., and Papert, S.A. Perceptrons. The MIT Press, (1988)"},{"issue":"12","key":"26_CR15","doi-asserted-by":"crossref","first-page":"1624","DOI":"10.1109\/PROC.1979.11543","volume":"67","author":"C.S. Roberts","year":"1979","unstructured":"Roberts, C.S. Partial match retrieval via the method of superimposed codes. Proc. IEEE 67, 12 (Dec. 1979), pp. 1624\u20131642","journal-title":"Proc. IEEE"},{"issue":"4","key":"26_CR16","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1145\/32204.32222","volume":"12","author":"R. Sacks-Davis","year":"1987","unstructured":"Sacks-Davis, R., Kent, A., and Ramamohanarao, K. Multikey Access Methods Based on Superimposed Coding Techniques. ACM Transactions on Database Systems, 12, 4, (December 1987), pp. 655\u2013696","journal-title":"ACM Transactions on Database Systems"},{"issue":"2","key":"26_CR17","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1002\/asi.5090110209","volume":"11","author":"S. Stiassny","year":"1960","unstructured":"Stiassny, S. Mathematical analysis of various superimposed coding methods. American Documentation 11, 2, (Feb. 1960), pp. 155\u2013169","journal-title":"American Documentation"},{"issue":"4","key":"26_CR18","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1145\/119311.119313","volume":"9","author":"P. Zezula","year":"1991","unstructured":"Zezula, P., Rabbiti, F., and Tiberio, P. Dynamic Partitioning of Signature Files. ACM Trans. Inf. Syst. 9, 4, (Oct. 1991), pp. 336\u2013369","journal-title":"ACM Trans. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-62868-1_117.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:40:08Z","timestamp":1619559608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-62868-1_117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540628682","9783540690313"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-62868-1_117","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}