{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T06:34:35Z","timestamp":1773297275558,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319163536","type":"print"},{"value":"9783319163543","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16354-3_16","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T12:53:25Z","timestamp":1426510405000},"page":"147-158","source":"Crossref","is-referenced-by-count":9,"title":["Approximate Nearest-Neighbour Search with Inverted Signature Slice Lists"],"prefix":"10.1007","author":[{"given":"Timothy","family":"Chappell","sequence":"first","affiliation":[]},{"given":"Shlomo","family":"Geva","sequence":"additional","affiliation":[]},{"given":"Guido","family":"Zuccon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Broder, A.: On the resemblance and containment of documents. In: Compression and Complexity of Sequences 1997, pp. 21\u201329. IEEE (1997)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45123-4_1","volume-title":"Combinatorial Pattern Matching","author":"A. Broder","year":"2000","unstructured":"Broder, A.: Identifying and filtering near-duplicate documents. In: Giancarlo, R., Sankoff, D. (eds.) CPM 2000. LNCS, vol.\u00a01848, pp. 1\u201310. Springer, Heidelberg (2000)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Chum, O., Matas, J.: Fast computation of min-hash signatures for image collections. In: CVPR 2012, pp. 3077\u20133084 (2012)","DOI":"10.1109\/CVPR.2012.6248039"},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/2275.357411","volume":"2","author":"C. Faloutsos","year":"1984","unstructured":"Faloutsos, C., Christodoulakis, S.: Signature files: An access method for documents and its analytical performance evaluation. TOIS\u00a02(4), 267\u2013288 (1984)","journal-title":"TOIS"},{"key":"16_CR5","first-page":"280","volume":"88","author":"C. Faloutsos","year":"1988","unstructured":"Faloutsos, C., Chan, R.: Fast text access methods for optical and large magnetic disks: Designs and performance comparison. VLDB\u00a088, 280\u2013293 (1988)","journal-title":"VLDB"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"Feistel, H.: Cryptography and computer privacy. Sci. Am.\u00a0228, 15\u201323 (1973)","journal-title":"Sci. Am."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Geva, S., De Vries, C.: Topsig: topology preserving document signatures. In: CIKM 2011, pp. 333\u2013338 (2011)","DOI":"10.1145\/2063576.2063629"},{"issue":"2","key":"16_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"R. Hamming","year":"1950","unstructured":"Hamming, R.: Error detecting and error correcting codes. Bell System Tech. J.\u00a029(2), 147\u2013160 (1950)","journal-title":"Bell System Tech. J."},{"key":"16_CR9","unstructured":"Jiang, Q., Sun, M.: Semi-supervised simhash for efficient document similarity search. In: ACL 2011, pp. 93\u2013101 (2011)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kulis, B., Grauman, K.: Kernelized locality-sensitive hashing for scalable image search. In: ICCV 2009, pp. 2130\u20132137 (2009)","DOI":"10.1109\/ICCV.2009.5459466"},{"issue":"3","key":"16_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/69.142018","volume":"4","author":"Z. Lin","year":"1992","unstructured":"Lin, Z., Faloutsos, C.: Frame-sliced signature files. IEEE Transactions on Knowledge and Data Engineering\u00a04(3), 281\u2013289 (1992)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Manku, G., Jain, A., Das Sarma, A.: Detecting near-duplicates for web crawling. In: WWW 2007, pp. 141\u2013150 (2007)","DOI":"10.1145\/1242572.1242592"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Potthast, M., Stein, B.: New issues in near-duplicate detection. In: Data Analysis, Machine Learning and Applications, pp. 601\u2013609. Springer (2008)","DOI":"10.1007\/978-3-540-78246-9_71"},{"key":"16_CR14","unstructured":"Van Rijsbergen, C.J.: Information Retrieval. In: Butterworth (1979)"},{"key":"16_CR15","unstructured":"Sadowski, C., Levin, G.: Simhash: Hash-based similarity detection. Technical report, Google Tech. Rep. (2007)"},{"issue":"2","key":"16_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MSP.2007.914237","volume":"25","author":"M. Slaney","year":"2008","unstructured":"Slaney, M., Casey, M.: Locality-sensitive hashing for finding nearest neighbors. Signal Processing Magazine\u00a025(2), 128\u2013131 (2008)","journal-title":"Signal Processing Magazine"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Sood, S., Loguinov, D.: Probabilistic near-duplicate detection using simhash. In: CIKM 2011, pp. 1117\u20131126 (2011)","DOI":"10.1145\/2063576.2063737"},{"issue":"4","key":"16_CR18","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1145\/296854.277632","volume":"23","author":"J. Zobel","year":"1998","unstructured":"Zobel, J., Moffat, A., Ramamohanarao, K.: Inverted files versus signature files for text indexing. TODS\u00a023(4), 453\u2013490 (1998)","journal-title":"TODS"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16354-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T16:21:20Z","timestamp":1559146880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16354-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319163536","9783319163543"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16354-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}