{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T23:48:44Z","timestamp":1649029724382},"reference-count":11,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1979,1,1]],"date-time":"1979-01-01T00:00:00Z","timestamp":283996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[1979,1]]},"DOI":"10.1016\/0306-4379(79)90002-4","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T21:31:39Z","timestamp":1060291899000},"page":"183-194","source":"Crossref","is-referenced-by-count":3,"title":["Overflow handling in hashing tables: A hybrid approach"],"prefix":"10.1016","volume":"4","author":[{"given":"Peter","family":"Scheuermann","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0306-4379(79)90002-4_BIB1","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0306-4379(75)90023-X","article-title":"Analysis of collisions when hashing by division","volume":"1","author":"Ghosh","year":"1975","journal-title":"Inform. Systems"},{"key":"10.1016\/0306-4379(79)90002-4_BIB2","first-page":"491","article-title":"Fundamentals of Data Structures","author":"Horowitz","year":"1976"},{"key":"10.1016\/0306-4379(79)90002-4_BIB3","first-page":"530","volume":"Vol. 3","author":"Knuth","year":"1973"},{"issue":"4","key":"10.1016\/0306-4379(79)90002-4_BIB4","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/362575.362578","article-title":"Key to address transform techniques: A fundamental performance study on large existing formulated files","volume":"14","author":"Lum","year":"1971","journal-title":"Commun. ACM"},{"key":"10.1016\/0306-4379(79)90002-4_BIB5","first-page":"376","article-title":"Computer Data-Base Organization","author":"Martin","year":"1977"},{"key":"10.1016\/0306-4379(79)90002-4_BIB6","series-title":"Computer Performance","first-page":"341","article-title":"Performance analysis of the chaining method for random-access addressing","author":"Mendelson","year":"1977"},{"issue":"8","key":"10.1016\/0306-4379(79)90002-4_BIB7","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1145\/368637.368827","article-title":"Analysis of a file addressing method","volume":"5","author":"Schay","year":"1962","journal-title":"Commun. ACM"},{"issue":"6","key":"10.1016\/0306-4379(79)90002-4_BIB8","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1145\/360238.360242","article-title":"A practitioner's guide to addressing algorithms","volume":"19","author":"Severance","year":"1976","journal-title":"Commun. ACM"},{"issue":"6","key":"10.1016\/0306-4379(79)90002-4_BIB9","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1147\/rd.166.0579","article-title":"Optimum storage allocation for initial loading of a file","volume":"16","author":"Van der Pool","year":"1972","journal-title":"IBM J. Res. Develop."},{"issue":"2","key":"10.1016\/0306-4379(79)90002-4_BIB10","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1147\/rd.172.0106","article-title":"Optimum storage allocation for a file with open addressing","volume":"17","author":"Van der Pool","year":"1973","journal-title":"IBM J. Res. Develop."},{"issue":"1","key":"10.1016\/0306-4379(79)90002-4_BIB11","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1093\/comjnl\/18.1.12","article-title":"Estimating magnetic disc seeks","volume":"18","author":"Waters","year":"1975","journal-title":"Comp. J."}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0306437979900024?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0306437979900024?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:50:54Z","timestamp":1552611054000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0306437979900024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1979,1]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1979,1]]}},"alternative-id":["0306437979900024"],"URL":"https:\/\/doi.org\/10.1016\/0306-4379(79)90002-4","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[1979,1]]}}}