{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:08:44Z","timestamp":1760202524844},"publisher-location":"Berlin, Heidelberg","reference-count":77,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649175"},{"type":"electronic","value":"9783540683117"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0029563","type":"book-chapter","created":{"date-parts":[[2005,12,6]],"date-time":"2005-12-06T09:47:06Z","timestamp":1133862426000},"page":"13-51","source":"Crossref","is-referenced-by-count":40,"title":["Self-organizing data structures"],"prefix":"10.1007","author":[{"given":"Susanne","family":"Albers","sequence":"first","affiliation":[]},{"given":"Jeffery","family":"Westbrook","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,11,22]]},"reference":[{"key":"2_CR1","volume-title":"Information Theory and Coding","author":"N. Abramson","year":"1983","unstructured":"N. Abramson. Information Theory and Coding. McGraw-Hill, New York, 1983."},{"key":"2_CR2","first-page":"1259","volume":"3","author":"G.M. Adel'son-Vel'skii","year":"1962","unstructured":"G.M. Adel'son-Vel'skii and E.M. Landis. An algorithm for the organization of information. Soviet Math. Dokl., 3:1259\u20131262, 1962.","journal-title":"Soviet Math. Dokl."},{"key":"2_CR3","unstructured":"S. Albers. Unpublished result."},{"key":"2_CR4","unstructured":"S. Albers. Improved randomized on-line algorithms for the list update problem. In Proc. of the 6th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 412\u2013419, 1995."},{"key":"2_CR5","first-page":"514","volume":"1099","author":"S. Albers","year":"1996","unstructured":"S. Albers and M. Mitzenmacher. Average case analyses of list update algorithms, with applications to data compression. In Proc. of the 23rd International Colloquium on Automata, Languages and Programming, Springer Lecture Notes in Computer Science, Volume 1099, pages 514\u2013525, 1996.","journal-title":"Proc. of the 23rd International Colloquium on Automata, Languages and Programming, Springer Lecture Notes in Computer Science"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/0020-0190(95)00142-Y","volume":"56","author":"S. Albers","year":"1995","unstructured":"S. Albers, B. von Stengel, and R. Werchner. A combined BIT and TIMESTAMP algorithm for the list update problem. Information Processing Letters, 56:135\u2013139, 1995.","journal-title":"Information Processing Letters"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1145\/322092.322094","volume":"25","author":"B. Allen","year":"1978","unstructured":"B. Allen and I. Munro. Self-organizing binary search trees. Journal of the ACM, 25(4):526\u2013535, October 1978.","journal-title":"Journal of the ACM"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"730","DOI":"10.2307\/3213536","volume":"19","author":"E.J. Anderson","year":"1982","unstructured":"E.J. Anderson, P. Nash, and R.R. Weber. A counterexample to a conjecture on optimal list ordering. Journal on Applied Probability, 19:730\u2013732, 1982.","journal-title":"Journal on Applied Probability"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"C.R. Aragon and R.G. Seidel. Randomized search trees. In Proc. 30th Symp. on Foundations of Computer Science, pages 540\u2013545, 1989.","DOI":"10.1109\/SFCS.1989.63531"},{"key":"2_CR10","unstructured":"R. Bachrach and R. El-Yaniv. Online list accessing algorithms and their applications: Recent empirical evidence. In Proc. of the 8th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 53\u201362, 1997."},{"issue":"4","key":"2_CR11","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1002\/spe.4380230403","volume":"23","author":"J. Bell","year":"1993","unstructured":"J. Bell and G. Gupta. Evaluation of self-adjusting binary search tree techniques. Software\u2014Practice & Experience, 23(4):369\u2013382, April 1993.","journal-title":"Software\u2014Practice & Experience"},{"issue":"7","key":"2_CR12","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1002\/spe.4380230705","volume":"23","author":"T. Bell","year":"1993","unstructured":"T. Bell and D. Kulp. Longest-match string searching for Ziv-Lempel compression. Software\u2014Practice and Experience, 23(7):757\u2013771, July 1993.","journal-title":"Software\u2014Practice and Experience"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/BF01294260","volume":"11","author":"S. Ben-David","year":"1994","unstructured":"S. Ben-David, A. Borodin, R.M. Karp, G. Tardos, and A. Wigderson. On the power of randomization in on-line algorithms. Algorithmica, 11:2\u201314, 1994.","journal-title":"Algorithmica"},{"key":"2_CR14","unstructured":"J.L. Bentley, K.L. Clarkson, and D.B. Levine. Fast linear expected-time algorithms for computing maxima and convex hulls. In Proc. of the 1st Annual ACM-SIAM Symposium on Discrete Algorithms, pages 179\u2013187, 1990."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/3341.3349","volume":"28","author":"J.L. Bentley","year":"1985","unstructured":"J.L. Bentley and C.C. McGeoch. Amortized analyses of self-organizing sequential search heuristics. Communication of the ACM, 28:404\u2013411, 1985.","journal-title":"Communication of the ACM"},{"key":"2_CR16","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1145\/5684.5688","volume":"29","author":"J.L. Bentley","year":"1986","unstructured":"J.L. Bentley, D.S. Sleator, R.E. Tarjan, and V.K. Wei. A locally adaptive data compression scheme. Communication of the ACM, 29:320\u2013330, 1986.","journal-title":"Communication of the ACM"},{"key":"2_CR17","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1137\/0208007","volume":"8","author":"J.R. Bitner","year":"1979","unstructured":"J.R. Bitner. Heuristics that dynamically organize data structures. SIAM Journal on Computing, 8:82\u2013110, 1979.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR18","unstructured":"M. Burrows and D.J. Wheeler. A block-sorting lossless data compression algorithm. Technical Report 124, DEC SRC, 1994."},{"key":"2_CR19","doi-asserted-by":"crossref","first-page":"697","DOI":"10.2307\/3212792","volume":"10","author":"P.J. Burville","year":"1973","unstructured":"P.J. Burville and J.F.C. Kingman. On a model for storage and search. Journal on Applied Probability, 10:697\u2013701, 1973.","journal-title":"Journal on Applied Probability"},{"issue":"2","key":"2_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/156063.156067","volume":"24","author":"R. Chaudhuri","year":"1993","unstructured":"R. Chaudhuri and H. Hoft. Splaying a search tree in preorder takes linear time. SIGACT News, 24(2):88\u201393, Spring 1993.","journal-title":"SIGACT News"},{"issue":"4","key":"2_CR21","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1109\/69.234780","volume":"5","author":"R.P. Cheetham","year":"1993","unstructured":"R.P. Cheetham, B.J. Oommen, and D.T.H. Ng. Adaptive structuring of binary search trees using conditional rotations. IEEE Transactions on Knowledge & Data Engineering, 5(4):695\u2013704, 1993.","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"F.R.K. Chung, D.J. Hajela, and P.D. Seymour. Self-organizing sequential search and hilbert's inequality. In Proc. 17th Annual Symposium on the Theory of Computing, pages 217\u2013223, 1985.","DOI":"10.1145\/22145.22170"},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1006\/jagm.1996.0004","volume":"20","author":"D. Cohen","year":"1996","unstructured":"D. Cohen and M.L. Fredman. Weighted binary trees for concurrent searching. Journal of Algorithms, 20(1):87\u2013112, January 1996.","journal-title":"Journal of Algorithms"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"R. Cole. On the dynamic finger conjecture for splay trees. Part 2: Finger searching. Technical Report 472, Courant Institute, NYU, 1989.","DOI":"10.1145\/100216.100218"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"R. Cole. On the dynamic finger conjecture for splay trees. In Proc. Symp. on Theory of Computing (STOC), pages 8\u201317, 1990.","DOI":"10.1145\/100216.100218"},{"key":"2_CR26","unstructured":"R. Cole, B. Mishra, J. Schmidt, and A. Siegel. On the dynamic finger conjecture for splay trees. Part 1: Splay sorting log n-block sequences. Technical Report 471, Courant Institute, NYU, 1989."},{"key":"2_CR27","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"1990","unstructured":"T. Cormen, C. Leiserson, and R. Rivest. Introduction to Algorithms. McGraw-Hill, New York, NY, 1990."},{"key":"2_CR28","unstructured":"C.A. Crane. Linear lists and priority queues as balanced binary trees. Technical Report STAN-CS-72-259, Dept. of Computer Science, Stanford University, 1972."},{"key":"2_CR29","unstructured":"R. El-Yaniv. There are infinitely many competitive-optimal online list accessing algorithms. Manuscript, May 1996."},{"key":"2_CR30","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TIT.1975.1055349","volume":"21","author":"P. Elias","year":"1975","unstructured":"P. Elias. Universal codeword sets and the representation of the integers. IEEE Transactions on Information Theory, 21:194\u2013203, 1975.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR31","unstructured":"M.J. Golin. Phd thesis. Technical Report CS-TR-266-90, Department of Computer Science, Princeton University, 1990."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"G.H. Gonnet, J.I. Munro, and H. Suwanda. Towards self-organizing linear search. In Proc. 19th Annual IEEE Symposium on Foundations of Computer Science, pages 169\u2013174, 1979.","DOI":"10.1109\/SFCS.1979.45"},{"key":"2_CR33","unstructured":"D. Grinberg, S. Rajagopalan, R. Venkatesan, and V.K. Wei. Splay trees for data compression. In Proc. of the 6th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 522\u2013530, 1995."},{"key":"2_CR34","volume-title":"Inequalities","author":"G.H. Hardy","year":"1967","unstructured":"G.H. Hardy, J.E. Littlewood, and G. Polya. Inequalities. Cambridge University Press, Cambridge, England, 1967."},{"key":"2_CR35","doi-asserted-by":"crossref","first-page":"886","DOI":"10.2307\/3212392","volume":"10","author":"W.J. Hendricks","year":"1973","unstructured":"W.J. Hendricks. An extension of a theorem concerning an intersting Markov chain. Journal on Applied Probability, 10:886\u2013890, 1973.","journal-title":"Journal on Applied Probability"},{"key":"2_CR36","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/5505.5507","volume":"17","author":"J.H. Hester","year":"1985","unstructured":"J.H. Hester and D.S. Hirschberg. Self-organizing linear search. ACM Computing Surveys, 17:295\u2013312, 1985.","journal-title":"ACM Computing Surveys"},{"key":"2_CR37","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/0020-0190(91)90086-W","volume":"38","author":"S. Irani","year":"1991","unstructured":"S. Irani. Two results on the list update problem. Information Processing Letters, 38:301\u2013306, 1991.","journal-title":"Information Processing Letters"},{"key":"2_CR38","unstructured":"S. Irani. Corrected version of the SPLIT algorithm. Manscript, January 1996."},{"issue":"8","key":"2_CR39","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1145\/63030.63036","volume":"31","author":"D.W. Jones","year":"1988","unstructured":"D.W. Jones. Application of splay trees to data compression. Communications of the ACM, 31(8):996\u20131007, August 1988.","journal-title":"Communications of the ACM"},{"key":"2_CR40","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1137\/0115076","volume":"15","author":"G. Schay Jr.","year":"1967","unstructured":"G. Schay Jr. and F. W. Dauer. A probabilistic model of a self-organizing file system. SIAM Journal on Applied Mathematics, 15:874\u2013888, 1967.","journal-title":"SIAM Journal on Applied Mathematics"},{"key":"2_CR41","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.2307\/3213210","volume":"17","author":"Y.C. Kan","year":"1980","unstructured":"Y.C. Kan and S.M. Ross. Optimal list orders under partial memory constraints. Journal on Applied Probability, 17:1004\u20131015, 1980.","journal-title":"Journal on Applied Probability"},{"key":"2_CR42","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/BF01294261","volume":"11","author":"R. Karp","year":"1994","unstructured":"R. Karp and P. Raghavan. From a personal communication cited in [61].","journal-title":"Algorithmica"},{"issue":"1","key":"2_CR43","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1080\/02522667.1992.10699094","volume":"13","author":"W.F. Klostermeyer","year":"1992","unstructured":"W.F. Klostermeyer. Optimizing searching with self-adjusting trees. Journal of Information & Optimization Sciences, 13(1):85\u201395, January 1992.","journal-title":"Journal of Information & Optimization Sciences"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"D.E. Knuth. Optimum binary search trees. Acta Informatica, pages 14\u201325, 1971.","DOI":"10.1007\/BF00264289"},{"key":"2_CR45","volume-title":"The Art of Computer Programming, Sorting and Searching, volume 3","author":"D.E. Knuth","year":"1973","unstructured":"D.E. Knuth. The Art of Computer Programming, Sorting and Searching, volume 3. Addison-Wesley, Reading, MA, 1973."},{"key":"2_CR46","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/0020-0190(82)90083-7","volume":"15","author":"K. Kulik II","year":"1982","unstructured":"K. Kulik II and D. Wood. A note on some tree similarity measures. Information Processing Letters, 15:39\u201342, 1982.","journal-title":"Information Processing Letters"},{"key":"2_CR47","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/0304-3975(81)90098-0","volume":"16","author":"K. Lam","year":"1981","unstructured":"K. Lam, M.K. Sui, and C.T. Yu. A generalized counter scheme. Theoretical Computer Science, 16:271\u2013278, 1981.","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"2_CR48","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0196-6774(87)90048-4","volume":"8","author":"J.M. Lucas","year":"1987","unstructured":"J.M. Lucas. The rotation graph of binary trees is Hamiltonian. Journal of Algorithms, 8(4):503\u2013535, December 1987.","journal-title":"Journal of Algorithms"},{"key":"2_CR49","unstructured":"J.M. Lucas. Arbitrary splitting in splay trees. Technical Report DCS-TR-234, Rutgers University, 1988."},{"key":"2_CR50","unstructured":"J.M. Lucas. Canonical forms for competitive binary search tree algorithms. Technical Report DCS-TR-250, Rutgers University, 1988."},{"issue":"2","key":"2_CR51","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/0020-0190(89)90069-0","volume":"31","author":"F. Luccio","year":"1989","unstructured":"F. Luccio and L. Pagli. On the upper bound on the rotation distance of binary trees. Information Processing Letters, 31(2):57\u201360, April 1989.","journal-title":"Information Processing Letters"},{"issue":"5","key":"2_CR52","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/0020-0190(88)90153-6","volume":"26","author":"E. Makinen","year":"1988","unstructured":"E. Makinen. On the rotation distance of binary trees. Information Processing Letters, 26(5):271\u2013272, January 1988.","journal-title":"Information Processing Letters"},{"key":"2_CR53","doi-asserted-by":"crossref","unstructured":"M.S. Manasse, L.A. McGeoch, and D.D. Sleator. Competitive algorithms for online problems. In Proc. 20th Annual ACM Symposium on Theory of Computing, pages 322\u201333, 1988.","DOI":"10.1145\/62212.62243"},{"issue":"3","key":"2_CR54","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/0020-0190(91)90235-A","volume":"38","author":"C. Martel","year":"1991","unstructured":"C. Martel. Self-adjusting multi-way search trees. Information Processing Letters, 38(3):135\u2013141, May 1991.","journal-title":"Information Processing Letters"},{"key":"2_CR55","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1287\/opre.13.4.609","volume":"12","author":"J. McCabe","year":"1965","unstructured":"J. McCabe. On serial files with relocatable records. Operations Research, 12:609\u2013618, 1965.","journal-title":"Operations Research"},{"key":"2_CR56","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/BF00264563","volume":"5","author":"K. Mehlhorn","year":"1975","unstructured":"K. Mehlhorn. Nearly optimal binary search trees. Acta Informatica, 5:287\u2013295, 1975.","journal-title":"Acta Informatica"},{"issue":"2","key":"2_CR57","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1137\/0208014","volume":"8","author":"K. Mehlhorn","year":"1979","unstructured":"K. Mehlhorn. Dynamic binary search. SIAM Journal on Computing, 8(2):175\u2013198, 1979.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR58","volume-title":"Data Structures and Algorithms","author":"K. Mehlhorn","year":"1984","unstructured":"K. Mehlhorn. Data Structures and Algorithms. Springer-Verlag, New York, 1984. (3 volumes)."},{"key":"2_CR59","first-page":"450","volume-title":"A fast algorithm for melding splay trees","author":"G. Port","year":"1989","unstructured":"G. Port and A. Moffat. A fast algorithm for melding splay trees. In Proceedings Workshop on Algorithms and Data Structures (WADS '89), pages 450\u2013459, Berlin, West Germany, 1989. Springer-Verlag."},{"key":"2_CR60","unstructured":"N. Reingold and J. Westbrook. Optimum off-line algorithms for the list update problem. Technical Report YALEU\/DCS\/TR-805, Yale University, 1990."},{"key":"2_CR61","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/BF01294261","volume":"11","author":"N. Reingold","year":"1994","unstructured":"N. Reingold, J. Westbrook, and D.D. Sleator. Randomized competitive algorithms for the list update problem. Algorithmica, 11:15\u201332, 1994.","journal-title":"Algorithmica"},{"key":"2_CR62","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/359997.360000","volume":"19","author":"R. Rivest","year":"1976","unstructured":"R. Rivest. On self-organizing sequential search heuristics. Communication of the ACM, 19:63\u201367, 1976.","journal-title":"Communication of the ACM"},{"issue":"1","key":"2_CR63","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1006\/jagm.1995.1026","volume":"19","author":"M. Sherk","year":"1995","unstructured":"M. Sherk. Self-adjusting k-ary search trees. Journal of Algorithms, 19(1):25\u201344, July 1995.","journal-title":"Journal of Algorithms"},{"key":"2_CR64","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1145\/2786.2793","volume":"28","author":"D.D. Sleator","year":"1985","unstructured":"D.D. Sleator and R.E. Tarjan. Amortized efficiency of list update and paging rules. Communication of the ACM, 28:202\u2013208, 1985.","journal-title":"Communication of the ACM"},{"key":"2_CR65","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1145\/3828.3835","volume":"32","author":"D.D. Sleator","year":"1985","unstructured":"D.D. Sleator and R.E. Tarjan. Self-adjusting binary search trees. Journal of the ACM, 32:652\u2013686, 1985.","journal-title":"Journal of the ACM"},{"key":"2_CR66","doi-asserted-by":"crossref","unstructured":"D.D. Sleator, R.E. Tarjan, and W.P. Thurston. Rotation distance, triangulations, and hyperbolic geometry. In Proc. 18th Symp. on Theory of Computing (STOC), pages 122\u2013135, 1986.","DOI":"10.1145\/12130.12143"},{"key":"2_CR67","doi-asserted-by":"crossref","unstructured":"R. Sundar. Twists, turns, cascades, deque conjecture, and scanning theorem. In Proc. 30th Symp. on Foundations of Computer Science (FOCS), pages 555\u2013559, 1989.","DOI":"10.1109\/SFCS.1989.63534"},{"key":"2_CR68","doi-asserted-by":"crossref","unstructured":"R. Sundar. Twists, turns, cascades, deque conjecture, and scanning theorem. Technical Report 427, Courant Institute, New York University, January 1989.","DOI":"10.1109\/SFCS.1989.63534"},{"key":"2_CR69","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970265","volume-title":"Data Structures and Network Algorithms","author":"R.E. Tarjan","year":"1983","unstructured":"R.E. Tarjan. Data Structures and Network Algorithms. Society for Industrial and Applied Mathematics, Philadelphia, PA., 1983."},{"key":"2_CR70","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1137\/0606031","volume":"6","author":"R.E. Tarjan","year":"1985","unstructured":"R.E. Tarjan. Amortized computational complexity. SIAM Journal on Algebraic and Discrete Methods, 6:306\u2013318, 1985.","journal-title":"SIAM Journal on Algebraic and Discrete Methods"},{"issue":"4","key":"2_CR71","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/BF02579253","volume":"5","author":"R.E. Tarjan","year":"1985","unstructured":"R.E. Tarjan. Sequential access in splay trees takes linear time. Combinatorica, 5(4):367\u2013378, 1985.","journal-title":"Combinatorica"},{"key":"2_CR72","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/0020-0190(93)90150-8","volume":"47","author":"B. Teia","year":"1993","unstructured":"B. Teia. A lower bound for randomized list update algorithms. Information Processing Letters, 47:5\u20139, 1993.","journal-title":"Information Processing Letters"},{"key":"2_CR73","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1145\/359588.359616","volume":"21","author":"A. Tenenbaum","year":"1978","unstructured":"A. Tenenbaum. Simulations of dynamic sequential search algorithms. Communication of the ACM, 21:790\u201379, 1978.","journal-title":"Communication of the ACM"},{"key":"2_CR74","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1137\/0211046","volume":"11","author":"A.M. Tenenbaum","year":"1982","unstructured":"A.M. Tenenbaum and R.M. Nemes. Two spectra of self-organizing sequential search. SIAM Journal on Computing, 11:557\u2013566, 1982.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR75","volume-title":"Technical Report CS-85-13","author":"J.S. Vitter","year":"1986","unstructured":"J.S. Vitter. Two papers on dynamic Huffman codes. Technical Report CS-85-13, Brown University Computer Science, Providence. R.I., Revised December 1986."},{"issue":"1","key":"2_CR76","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1137\/0218004","volume":"18","author":"R. Wilber","year":"1989","unstructured":"R. Wilber. Lower bounds for accessing binary search trees with rotations. SIAM Journal on Computing, 18(1):56\u201367, February 1989.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR77","unstructured":"I.H. Witten and T. Bell. The Calgary\/Canterbury text compression corpus. Anonymous ftp from ftp.cpsc.ucalgary.ca \/pub\/text.compression\/corpus\/ text.compression.corpus.tar.Z."}],"container-title":["Lecture Notes in Computer Science","Online Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0029563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T07:17:45Z","timestamp":1586589465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0029563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649175","9783540683117"],"references-count":77,"URL":"https:\/\/doi.org\/10.1007\/bfb0029563","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}