{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T19:20:27Z","timestamp":1649100027652},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1985,4,1]],"date-time":"1985-04-01T00:00:00Z","timestamp":481161600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Acta Informatica"],"published-print":{"date-parts":[[1985,4]]},"DOI":"10.1007\/bf00290144","type":"journal-article","created":{"date-parts":[[2004,10,5]],"date-time":"2004-10-05T01:53:34Z","timestamp":1096941214000},"page":"35-45","source":"Crossref","is-referenced-by-count":0,"title":["Thrifty execution of task pipelines"],"prefix":"10.1007","volume":"22","author":[{"given":"Fred B.","family":"Schneider","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard","family":"Conway","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dale","family":"Skeen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"CR1","volume-title":"Principles of Compiler Design","author":"A. Aho","year":"1977","unstructured":"Aho, A., Ullman, J.: Principles of Compiler Design. Reading, MA: Addison Wesley 1977"},{"key":"CR2","first-page":"1181","volume":"40","author":"R. Conway","year":"1972","unstructured":"Conway, R., Maxwell, W., Morgan, H.: Selective Security Capabilities in ASAP ? A File Management System. AFIPS Conf. Proc. 40, 1181?1185 (1972)","journal-title":"AFIPS Conf. Proc."},{"key":"CR3","unstructured":"Simultaneous Reporting System. SRS 360 Reference Manual. Chilton Computer Company 1973"},{"key":"CR4","first-page":"194","volume-title":"The An of Computer Programming, Volume 1: Fundamental Algorithms","author":"D. Knuth","year":"1968","unstructured":"Knuth, D.: The An of Computer Programming, Volume 1: Fundamental Algorithms, pp. 194?196. Reading, MA: Addison Wesley 1968"},{"key":"CR5","first-page":"153","volume":"27","author":"P. Krass","year":"1981","unstructured":"Krass, P., Wiener, H.: The DBMS Market is Booming. Datamation 27, 153?170 (1981)","journal-title":"Datamation"},{"key":"CR6","unstructured":"NATURAL Reference Manual. ADABAS Systems, Software AG of North America"},{"key":"CR7","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1002\/j.1538-7305.1978.tb02136.x","volume":"57","author":"D. Ritchie","year":"1978","unstructured":"Ritchie, D., Thompson, K.: The UNIX Time-Sharing System. Bell Syst Tech. J. 57, 1905?1929 (1978)","journal-title":"Bell Syst Tech. J."}],"container-title":["Acta Informatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00290144.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00290144\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00290144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T17:15:19Z","timestamp":1554743719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00290144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,4]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1985,4]]}},"alternative-id":["BF00290144"],"URL":"https:\/\/doi.org\/10.1007\/bf00290144","relation":{},"ISSN":["0001-5903","1432-0525"],"issn-type":[{"value":"0001-5903","type":"print"},{"value":"1432-0525","type":"electronic"}],"subject":[],"published":{"date-parts":[[1985,4]]}}}