{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:46:59Z","timestamp":1775857619752,"version":"3.50.1"},"reference-count":95,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[1995,6,1]],"date-time":"1995-06-01T00:00:00Z","timestamp":801964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":6621,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1995,6]]},"DOI":"10.1016\/0304-3975(95)00002-e","type":"journal-article","created":{"date-parts":[[2003,5,13]],"date-time":"2003-05-13T00:04:58Z","timestamp":1052784298000},"page":"3-58","source":"Crossref","is-referenced-by-count":312,"title":["Mellin transforms and asymptotics: Harmonic sums"],"prefix":"10.1016","volume":"144","author":[{"given":"Philippe","family":"Flajolet","sequence":"first","affiliation":[]},{"given":"Xavier","family":"Gourdon","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Dumas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0304-3975(95)00002-E_BIB1_1","author":"Abramowitz","year":"1973"},{"key":"10.1016\/0304-3975(95)00002-E_BIB1_2","doi-asserted-by":"crossref","unstructured":"a reprint of the 10th National Bureau of Standards edition, 1964.","DOI":"10.6028\/NBS.MP.264"},{"key":"10.1016\/0304-3975(95)00002-E_BIB2","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1112\/blms\/17.6.531","article-title":"Dirichlet series and curious infinite products","volume":"17","author":"Allouche","year":"1985","journal-title":"Bull. London Math. Soc."},{"key":"10.1016\/0304-3975(95)00002-E_BIB3","article-title":"Encyclopedia of Mathematics and its Application","volume":"Vol. 2","author":"Andrews","year":"1976"},{"key":"10.1016\/0304-3975(95)00002-E_BIB4","series-title":"Introduction to Analytic Number Theory","author":"Apostol","year":"1976"},{"key":"10.1016\/0304-3975(95)00002-E_BIB5","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/0022-314X(84)90094-5","article-title":"Dirichlet series related to the Riemann zeta function","volume":"19","author":"Apostol","year":"1984","journal-title":"J. Number Theory"},{"key":"10.1016\/0304-3975(95)00002-E_BIB6","first-page":"253","article-title":"The Maclaurin sum formula","volume":"2","author":"Barnes","year":"1905"},{"key":"10.1016\/0304-3975(95)00002-E_BIB7","series-title":"Analytic Number Theory, An Introduction","author":"Bellman","year":"1980"},{"key":"10.1016\/0304-3975(95)00002-E_BIB8","author":"Berndt","year":"1989"},{"key":"10.1016\/0304-3975(95)00002-E_BIB9","first-page":"118","article-title":"Extensions of asymptotic expansions from Chapter 15 of Ramanujan's second notebook","volume":"361","author":"Berndt","year":"1985","journal-title":"J. Reine Angew. Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB10","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/0022-247X(89)90032-2","article-title":"Analysis of certain lattice sums","volume":"143","author":"Borwein","year":"1989","journal-title":"J. Math. Anal. Appl."},{"key":"10.1016\/0304-3975(95)00002-E_BIB11","series-title":"Advanced Combinatorics","author":"Comtet","year":"1974"},{"key":"10.1016\/0304-3975(95)00002-E_BIB12","series-title":"Multiplicative Number Theory","author":"Davenport","year":"1980"},{"key":"10.1016\/0304-3975(95)00002-E_BIB13","series-title":"Integral Transforms and Their Applications","author":"Davies","year":"1978"},{"key":"10.1016\/0304-3975(95)00002-E_BIB14_1","first-page":"210","article-title":"On Mahler's partition problem","volume":"10","author":"De Bruijn","year":"1948","journal-title":"Indagationes Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB14_2","unstructured":"reprinted from Koninkl. Nederl. Akademie Wetenschappen, Ser. A."},{"key":"10.1016\/0304-3975(95)00002-E_BIB15_1","series-title":"Asymptotic Methods in Analysis","author":"De Bruijn","year":"1981"},{"key":"10.1016\/0304-3975(95)00002-E_BIB15_2","unstructured":"a reprint of the third North-Holland edition, 1970 (first edition, 1958)."},{"key":"10.1016\/0304-3975(95)00002-E_BIB16","series-title":"Graph Theory and Computing","first-page":"15","article-title":"The average height of planted plane trees","author":"De Bruijn","year":"1972"},{"key":"10.1016\/0304-3975(95)00002-E_BIB17","series-title":"Asymptotic Expansions: Their Derivation and Interpretation","author":"Dingle","year":"1973"},{"key":"10.1016\/0304-3975(95)00002-E_BIB18","volume":"Vols. 1\u20133","author":"Doetsch","year":"1955"},{"key":"10.1016\/0304-3975(95)00002-E_BIB19","series-title":"Tables of Integral Transforms","author":"Erd\u00e9lyi","year":"1954"},{"key":"10.1016\/0304-3975(95)00002-E_BIB20","doi-asserted-by":"crossref","first-page":"441","DOI":"10.2307\/1427308","article-title":"On a functional equation arising in the analysis of a protocol for multiaccess broadcast channel","volume":"18","author":"Fayolle","year":"1986","journal-title":"Adv. Appl. Probab."},{"key":"10.1016\/0304-3975(95)00002-E_BIB21","volume":"Vol. 1","author":"Feller","year":"1968"},{"key":"10.1016\/0304-3975(95)00002-E_BIB22","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/BF01934993","article-title":"Approximate counting: a detailed analysis","volume":"25","author":"Flajolet","year":"1985","journal-title":"BIT"},{"key":"10.1016\/0304-3975(95)00002-E_BIB23","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/BF02241657","article-title":"On adaptive sampling","volume":"34","author":"Flajolet","year":"1990","journal-title":"Computing"},{"key":"10.1016\/0304-3975(95)00002-E_BIB24_1","series-title":"Automata, Languages and Programming","first-page":"137","article-title":"Exact asymptotics of divide-and-conquer recurrences","volume":"Vol. 700","author":"Flajolet","year":"1993"},{"key":"10.1016\/0304-3975(95)00002-E_BIB24_2","series-title":"Proc. 20th ICALP Conf.","author":"Flajolet","year":"1993"},{"key":"10.1016\/0304-3975(95)00002-E_BIB25","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/BF01177551","article-title":"Mellin transforms and asymptotics: the mergesort recurrence","volume":"31","author":"Flajolet","year":"1994","journal-title":"Acta Inform."},{"key":"10.1016\/0304-3975(95)00002-E_BIB26","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/0304-3975(92)00065-Y","article-title":"Mellin transforms and asymptotics: digital sums","volume":"123","author":"Flajolet","year":"1994","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/0304-3975(95)00002-E_BIB27","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/0022-0000(85)90041-8","article-title":"Probabilistic counting algorithms for data base applications","volume":"31","author":"Flajolet","year":"1985","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/0304-3975(95)00002-E_BIB28","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1137\/0215046","article-title":"Register allocation for unary-binary trees","volume":"15","author":"Flajolet","year":"1986","journal-title":"SIAM J. Comput."},{"key":"10.1016\/0304-3975(95)00002-E_BIB29","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/5383.5453","article-title":"Partial match retrieval of multidimensional data","volume":"33","author":"Flajolet","year":"1986","journal-title":"J. ACM"},{"key":"10.1016\/0304-3975(95)00002-E_BIB30","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/0304-3975(79)90009-4","article-title":"The number of registers required to evaluate arithmetic expressions","volume":"9","author":"Flajolet","year":"1979","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/0304-3975(95)00002-E_BIB31","series-title":"Combinatorial Algorithms on Words","first-page":"241","article-title":"Some uses of the Mellin integral transform in the analysis of algorithms","volume":"Vol. 12","author":"Flajolet","year":"1985"},{"key":"10.1016\/0304-3975(95)00002-E_BIB32","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1002\/rsa.3240030309","article-title":"Generalized digital trees and their difference-differential equations","volume":"3","author":"Flajolet","year":"1992","journal-title":"Random Struct. Algorithms"},{"key":"10.1016\/0304-3975(95)00002-E_BIB33","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0304-3975(91)90145-R","article-title":"Automatic average-case analysis of algorithms","volume":"79","author":"Flajolet","year":"1991","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/0304-3975(95)00002-E_BIB34","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/0304-3975(94)00281-M","article-title":"Mellin transforms and asymptotics: Finite differences and Rice's integrals","volume":"144","author":"Flajolet","year":"1995","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/0304-3975(95)00002-E_BIB35","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/0022-247X(74)90176-0","article-title":"Recurrence relations based on minimization","volume":"48","author":"Fredman","year":"1974","journal-title":"J. Math. Anal. Appl."},{"issue":"4","key":"10.1016\/0304-3975(95)00002-E_BIB36","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/0020-0190(78)90059-5","article-title":"Notes on the derivation of asymptotic expressions from summations","volume":"7","author":"Gonnet","year":"1978","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/0304-3975(95)00002-E_BIB37","author":"Gonnet","year":"1991"},{"key":"10.1016\/0304-3975(95)00002-E_BIB38","series-title":"Combinatorial Enumeration","author":"Goulden","year":"1983"},{"key":"10.1016\/0304-3975(95)00002-E_BIB39","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1145\/23005.23006","article-title":"Estimating the multiplicities of conflicts to speed their resolution in multiple access channels","volume":"34","author":"Greenberg","year":"1987","journal-title":"J. ACM"},{"key":"10.1016\/0304-3975(95)00002-E_BIB40_1","series-title":"Ramanujan: Twelve Lectures on Subjects Suggested by his Life and Work","author":"Hardy","year":"1978"},{"key":"10.1016\/0304-3975(95)00002-E_BIB40_2","unstructured":"reprinted and corrected from the first edition, Cambridge, 1940."},{"key":"10.1016\/0304-3975(95)00002-E_BIB41","article-title":"The General Theory of Dirichlet's Series","volume":"Vol. 18","author":"Hardy","year":"1915"},{"key":"10.1016\/0304-3975(95)00002-E_BIB42","article-title":"Lectures on Dirichlet Series, Modular Functions and Quadratic Forms","author":"Hecke","year":"1983"},{"key":"10.1016\/0304-3975(95)00002-E_BIB43","series-title":"Applied and Computational Complex Analysis","author":"Henrici","year":"1977"},{"key":"10.1016\/0304-3975(95)00002-E_BIB44","series-title":"Probabilistic Analysis of Algorithms","author":"Hofri","year":"1987"},{"key":"10.1016\/0304-3975(95)00002-E_BIB45_1","series-title":"CAAP '86","first-page":"196","article-title":"Trie partitioning process: limiting distributions","volume":"Vol. 24","author":"Jacquet","year":"1986"},{"key":"10.1016\/0304-3975(95)00002-E_BIB45_2","series-title":"Proc. 11th Colloq. on Trees in Algebra and Programming","author":"Jacquet","year":"1986"},{"key":"10.1016\/0304-3975(95)00002-E_BIB46","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1137\/0218054","article-title":"Ultimate characterizations of the burst response of an interval searching algorithm: a study of a functional equation","volume":"18","author":"Jacquet","year":"1989","journal-title":"SIAM J. Comput."},{"key":"10.1016\/0304-3975(95)00002-E_BIB47","series-title":"Asymptotic behavior of the Lempel-Ziv parsing scheme and digital search trees","author":"Jacquet","year":"1991"},{"key":"10.1016\/0304-3975(95)00002-E_BIB48","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0097-3165(94)90065-5","article-title":"Autocorrelation on words and its applications: analysis of suffix trees by string-ruler approach","volume":"66","author":"Jacquet","year":"1994","journal-title":"J. Combin. Theory Ser. A"},{"key":"10.1016\/0304-3975(95)00002-E_BIB49","article-title":"Basic Analysis of Regularized Series and Products","volume":"Vol. 1562","author":"Jorgenson","year":"1993"},{"key":"10.1016\/0304-3975(95)00002-E_BIB50","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/BF00289094","article-title":"The average number of registers needed to evaluate a binary tree optimally","volume":"11","author":"Kemp","year":"1979","journal-title":"Acta Inform."},{"key":"10.1016\/0304-3975(95)00002-E_BIB51","series-title":"Fundamentals of the Average Case Analysis of Particular Algorithms","author":"Kemp","year":"1984"},{"key":"10.1016\/0304-3975(95)00002-E_BIB52","first-page":"21","article-title":"Analysis of an optimized search algorithm for skip lists","author":"Kirschenhofer","year":"1994"},{"key":"10.1016\/0304-3975(95)00002-E_BIB53","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1112\/S0025579300006409","article-title":"On some applications of formulae of Ramanujan in the analysis of algorithms","volume":"38","author":"Kirschenhofer","year":"1991","journal-title":"Mathematika"},{"key":"10.1016\/0304-3975(95)00002-E_BIB54","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/0166-218X(89)90050-4","article-title":"On the variance of the external path length in a symmetric digital trie","volume":"25","author":"Kirschenhofer","year":"1989","journal-title":"Discrete Appl. Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB55","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/0377-0427(92)90001-E","article-title":"The sampling theorem, Dirichlet series and Hankel transforms","volume":"44","author":"Klusch","year":"1992","journal-title":"J. Comput. Appl. Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB56","article-title":"The Art of Computer Programming","volume":"Vol. 3","author":"Knuth","year":"1973"},{"key":"10.1016\/0304-3975(95)00002-E_BIB57","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/S1385-7258(78)80014-6","article-title":"The average time for carry propagation","volume":"40","author":"Knuth","year":"1978","journal-title":"Indagationes Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB58","series-title":"Structural Properties of Polylogarithms","year":"1991"},{"key":"10.1016\/0304-3975(95)00002-E_BIB59","first-page":"i","article-title":"Robert Hjalmar Mellin","volume":"Vol. 61","author":"Lindel\u00f6f","year":"1993","journal-title":"Advances in Mathematics"},{"key":"10.1016\/0304-3975(95)00002-E_BIB60","series-title":"Multi-User Communication Systems","volume":"Vol. 265","year":"1981"},{"key":"10.1016\/0304-3975(95)00002-E_BIB61","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1080\/14786444908521717","article-title":"The application of Mellin transforms to the summation of slowly converging series","volume":"40","author":"Macfarlane","year":"1949","journal-title":"Philos. Mag."},{"key":"10.1016\/0304-3975(95)00002-E_BIB62","series-title":"Evolution of Random Search Trees","author":"Mahmoud","year":"1992"},{"key":"10.1016\/0304-3975(95)00002-E_BIB63","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TIT.1985.1057013","article-title":"Q-ary collision resolution algorithms in random access systems with free or blocked channel access","volume":"IT-31","author":"Mathys","year":"1985","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0304-3975(95)00002-E_BIB64","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF02418382","article-title":"Die Dirichlet'schen Reihen, die zahlentheoretischen Funktionen und die endlichen Produkte von endlichem Geshlecht","volume":"28","author":"Mellin","year":"1904","journal-title":"Acta Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB65","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/BF01475775","article-title":"Abri\u03b2 einer einheitlichen Theorie der Gamma- und der hypergeometrischen Funktionen","volume":"68","author":"Mellin","year":"1910","journal-title":"Math. Ann."},{"key":"10.1016\/0304-3975(95)00002-E_BIB66","first-page":"275","article-title":"Tables of Mellin Transforms","author":"Oberhettinger","year":"1974"},{"key":"10.1016\/0304-3975(95)00002-E_BIB67","series-title":"Tables of Fourier Transforms and Fourier Transforms of Distributions","author":"Oberhettinger","year":"1990"},{"key":"10.1016\/0304-3975(95)00002-E_BIB68","series-title":"Combinatorial Algorithms on Words","first-page":"205","article-title":"Enumeration of string","volume":"Vol. 12","author":"Odlyzko","year":"1985"},{"key":"10.1016\/0304-3975(95)00002-E_BIB69","doi-asserted-by":"crossref","first-page":"1361","DOI":"10.1137\/0524079","article-title":"An elementary approach to some analytic asymptotics","volume":"24","author":"Pippenger","year":"1993","journal-title":"SIAM J. Math. Anal."},{"key":"10.1016\/0304-3975(95)00002-E_BIB70","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/0012-365X(93)90572-B","article-title":"How to select a loser","volume":"120","author":"Prodinger","year":"1993","journal-title":"Discrete Math."},{"key":"10.1016\/0304-3975(95)00002-E_BIB71","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/0304-3975(92)90371-L","article-title":"Hypothetical analyses: approximate counting in the style of Knuth, path length in the style of Flajolet","volume":"100","author":"Prodinger","year":"1993","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/0304-3975(95)00002-E_BIB72","article-title":"Evaluation des performances du hachage dynamique","author":"R\u00e9gnier","year":"1983"},{"key":"10.1016\/0304-3975(95)00002-E_BIB73","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/BF01934379","article-title":"Analysis of grid file algorithms","volume":"25","author":"R\u00e9gnier","year":"1985","journal-title":"BIT"},{"key":"10.1016\/0304-3975(95)00002-E_BIB74","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/net.3230130104","article-title":"Probabilistic analysis of divide-and-conquer heuristics for minimum weighted Euclidean matching","volume":"13","author":"Reingold","year":"1983","journal-title":"Networks"},{"key":"10.1016\/0304-3975(95)00002-E_BIB75","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1137\/0207022","article-title":"Data movement in odd-even merging","volume":"7","author":"Sedgewick","year":"1978","journal-title":"SIAM J. Comput."},{"key":"10.1016\/0304-3975(95)00002-E_BIB76","series-title":"Algorithms","author":"Sedgewick","year":"1988"},{"key":"10.1016\/0304-3975(95)00002-E_BIB77","series-title":"The Use of Integral Transforms","author":"Sneddon","year":"1972"},{"key":"10.1016\/0304-3975(95)00002-E_BIB78","volume":"Vol. I","author":"Stanley","year":"1986"},{"key":"10.1016\/0304-3975(95)00002-E_BIB79","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/0196-6774(88)90039-9","article-title":"Some results on V-ary asymmetric tries","volume":"9","author":"Szpankowski","year":"1988","journal-title":"J. Algorithms"},{"key":"10.1016\/0304-3975(95)00002-E_BIB80","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1145\/96559.214080","article-title":"Patricia tries again revisited","volume":"37","author":"Szpankowski","year":"1990","journal-title":"J. ACM"},{"key":"10.1016\/0304-3975(95)00002-E_BIB81","series-title":"The Theory of Functions","author":"Titchmarsh","year":"1939"},{"key":"10.1016\/0304-3975(95)00002-E_BIB82_1","series-title":"Introduction to the Theory of Fourier Integrals","author":"Titchmarsh","year":"1986"},{"key":"10.1016\/0304-3975(95)00002-E_BIB82_2","unstructured":"reprinted from the second edition, Oxford, 1948."},{"key":"10.1016\/0304-3975(95)00002-E_BIB83","series-title":"The Theory of the Riemann Zeta-function","author":"Titchmarsh","year":"1986"},{"key":"10.1016\/0304-3975(95)00002-E_BIB84","first-page":"431","article-title":"Analysis of algorithms and data structures","author":"Vitter","year":"1990"},{"key":"10.1016\/0304-3975(95)00002-E_BIB85","series-title":"A Course of Modern Analysis","author":"Whittaker","year":"1927"},{"key":"10.1016\/0304-3975(95)00002-E_BIB86","series-title":"The Laplace Transform","author":"Widder","year":"1941"},{"key":"10.1016\/0304-3975(95)00002-E_BIB87","series-title":"Generatingfunctionology","author":"Wilf","year":"1990"},{"key":"10.1016\/0304-3975(95)00002-E_BIB88","series-title":"Asymptotic Approximations of Integrals","author":"Wong","year":"1989"}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:030439759500002E?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:030439759500002E?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T08:28:05Z","timestamp":1555403285000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/030439759500002E"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,6]]},"references-count":95,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1995,6]]}},"alternative-id":["030439759500002E"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(95)00002-e","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[1995,6]]}}}