{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T13:53:38Z","timestamp":1648562018563},"reference-count":16,"publisher":"Elsevier BV","issue":"1-5","license":[{"start":{"date-parts":[[1992,9,1]],"date-time":"1992-09-01T00:00:00Z","timestamp":715305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessing and Microprogramming"],"published-print":{"date-parts":[[1992,9]]},"DOI":"10.1016\/0165-6074(92)90337-7","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T00:56:10Z","timestamp":1060304170000},"page":"345-352","source":"Crossref","is-referenced-by-count":0,"title":["Performance comparison of signature-based multikey access methods"],"prefix":"10.1016","volume":"35","author":[{"given":"Jae Woo","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jae Soo","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Yoon Joon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No. 3","key":"10.1016\/0165-6074(92)90337-7_BIB1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MC.1987.1663506","article-title":"Computer Architecture for a Surrogate File to very Large Data\/Knowledge Base","volume":"Vol. 20","author":"Berra","year":"1987","journal-title":"IEEE Computer"},{"key":"10.1016\/0165-6074(92)90337-7_BIB2","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1145\/75335.75353","article-title":"Multikey Access Methods Based on Term Discrimination and Signature Clustering","author":"Chang","year":"1989","journal-title":"ACM SIGIR"},{"key":"10.1016\/0165-6074(92)90337-7_BIB3","series-title":"Proc. Spring KISS Conf.","first-page":"277","article-title":"A Study on Performance Comparison of Multikey Access Methods Based on Signature files","author":"Chang","year":"1990"},{"issue":"No. 2","key":"10.1016\/0165-6074(92)90337-7_BIB4","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TSE.1984.5010223","article-title":"Design Consideration for a Message File Server","volume":"SE-10","author":"Christodoulakis","year":"1984","journal-title":"IEEE Trans. SE"},{"issue":"No. 1","key":"10.1016\/0165-6074(92)90337-7_BIB5","first-page":"207","article-title":"FIRST: Flexible Information Retrieval System for Text","volume":"Vol. 30","author":"Dattola","year":"1979","journal-title":"J. Am. Soc. Inf. Sci.(JASIS)"},{"issue":"No. 3","key":"10.1016\/0165-6074(92)90337-7_BIB6","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1002\/(SICI)1097-4571(198605)37:3<158::AID-ASI7>3.0.CO;2-A","article-title":"A Data Model for Use with Formatted and Textual Data","volume":"Vol. 37","author":"Desai","year":"1986","journal-title":"J. Am. Soc. Inf. Sci.(JASIS)"},{"issue":"No. 1","key":"10.1016\/0165-6074(92)90337-7_BIB7","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/4078.4080","article-title":"Access Methods for Text","volume":"Vol. 17","author":"Faloutsos","year":"1985","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0165-6074(92)90337-7_BIB8","first-page":"165","article-title":"Design of a Signature File Method that Accounts for Non-Uniform Occurrence Query Frequencies","author":"Faloutsos","year":"1985","journal-title":"ACM SIGMOD"},{"key":"10.1016\/0165-6074(92)90337-7_BIB9","series-title":"Proc. of VLDB Conf.","first-page":"280","article-title":"Fast Text Access Methods for Optical and Large Magnetic Disks: Design and Performance Comparison","author":"Faloutsos","year":"1988"},{"key":"10.1016\/0165-6074(92)90337-7_BIB10","series-title":"Proc. of the Fall Joint Computer Conf.","first-page":"423","article-title":"An Information Retrieval System Based on Superimposed Coding","author":"Files","year":"1969"},{"issue":"No. 9","key":"10.1016\/0165-6074(92)90337-7_BIB11","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1145\/359007.359013","article-title":"Partial-Match Retrieval Using Indexed Descriptor Files","volume":"Vol. 23","author":"Pfaltz","year":"1980","journal-title":"Communication of the ACM"},{"key":"10.1016\/0165-6074(92)90337-7_BIB12","series-title":"Proc. of ACM-BCS Joint Conf.","first-page":"21","article-title":"Evaluation of Access to Text Documents in Office System","author":"Rabbit","year":"1984"},{"key":"10.1016\/0165-6074(92)90337-7_BIB13","series-title":"Proc. of Logic Programming Conf.","first-page":"569","article-title":"A Superimposed Codeword Indexing Scheme for Very large Prolog Databases","author":"Ramamohanarao","year":"1986"},{"key":"10.1016\/0165-6074(92)90337-7_BIB14","doi-asserted-by":"crossref","first-page":"1624","DOI":"10.1109\/PROC.1979.11543","article-title":"Partial-Match Retrieval via the Method of Superimposed Codes","volume":"67","author":"Roberts","year":"1979","journal-title":"Proc. IEEE"},{"issue":"No. 4","key":"10.1016\/0165-6074(92)90337-7_BIB15","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/0306-4379(85)90043-2","article-title":"Performance of A Multi-Key Access Method Based On Descriptors and Superimposed Coding Techniques","volume":"Vol. 10","author":"Sacks-Davis","year":"1985","journal-title":"Information Systems"},{"issue":"No. 4","key":"10.1016\/0165-6074(92)90337-7_BIB16","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1145\/32204.32222","article-title":"Multikey Access Methods Based on Superimposed Coding Techniques","volume":"Vol. 12","author":"Sacks-Davis","year":"1987","journal-title":"ACM Trans. on Database Systems"}],"container-title":["Microprocessing and Microprogramming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0165607492903377?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0165607492903377?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T21:52:34Z","timestamp":1552600354000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0165607492903377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,9]]},"references-count":16,"journal-issue":{"issue":"1-5","published-print":{"date-parts":[[1992,9]]}},"alternative-id":["0165607492903377"],"URL":"https:\/\/doi.org\/10.1016\/0165-6074(92)90337-7","relation":{},"ISSN":["0165-6074"],"issn-type":[{"value":"0165-6074","type":"print"}],"subject":[],"published":{"date-parts":[[1992,9]]}}}