{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:24:09Z","timestamp":1757629449963,"version":"3.44.0"},"reference-count":19,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1992,2,1]],"date-time":"1992-02-01T00:00:00Z","timestamp":696902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[1992,2,1]],"date-time":"1992-02-01T00:00:00Z","timestamp":696902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Parallel and Distributed Computing"],"published-print":{"date-parts":[[1992,2]]},"DOI":"10.1016\/0743-7315(92)90116-5","type":"journal-article","created":{"date-parts":[[2004,2,23]],"date-time":"2004-02-23T15:14:09Z","timestamp":1077549249000},"page":"193-200","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"title":["Conflict-free access to parallel memories"],"prefix":"10.1016","volume":"14","author":[{"given":"Charles J.","family":"Colbourn","sequence":"first","affiliation":[]},{"given":"Katherine","family":"Heinrich","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0743-7315(92)90116-5_BIB1","series-title":"Proc. 1988 International Conference on Parallel Processing","first-page":"103","article-title":"On array storage for conflict-free memory access for parallel processors","author":"Balakrishnan","year":"1988"},{"key":"10.1016\/0743-7315(92)90116-5_BIB2","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/T-C.1971.223171","article-title":"The organization and use of parallel memories","volume":"C-20","author":"Budnik","year":"1971","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB3","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/T-C.1975.224291","article-title":"Time and parallel processor bounds for linear recurrence systems","volume":"C-24","author":"Chen","year":"1975","journal-title":"IEEE Trans. Comput."},{"year":"1991","series-title":"Conflict-free access to parallel memories","author":"Colbourn","key":"10.1016\/0743-7315(92)90116-5_BIB4"},{"key":"10.1016\/0743-7315(92)90116-5_BIB5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/0020-0190(80)90115-5","article-title":"Conflict-free access of arrays\u2014A counterexample","volume":"10","author":"Deb","year":"1980","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/0743-7315(92)90116-5_BIB6","unstructured":"D\u00e9nes J., Keedwell, D. Latin Squares: New Developments in the Theory and Applications. Annals of Discrete Math.46 North-Holland, Amsterdam."},{"key":"10.1016\/0743-7315(92)90116-5_BIB7","doi-asserted-by":"crossref","first-page":"1440","DOI":"10.1109\/TC.1987.5009496","article-title":"Vector access performance in parallel memories using a skewed storage scheme","volume":"C-36","author":"Harper","year":"1987","journal-title":"IEEE Trans. Comput."},{"year":"1990","series-title":"Perfect latin squares","author":"Heinrich","key":"10.1016\/0743-7315(92)90116-5_BIB8"},{"key":"10.1016\/0743-7315(92)90116-5_BIB9","first-page":"142","article-title":"Parallele algorithmen","volume":"6","author":"Hossfeld","year":"1983","journal-title":"Inform. Spektr."},{"key":"10.1016\/0743-7315(92)90116-5_BIB10","series-title":"Proc. 16th International Symposium on Computer Architecture","first-page":"372","article-title":"Perfect latin squares and parallel memory access","author":"Kim","year":"1989"},{"key":"10.1016\/0743-7315(92)90116-5_BIB11","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TC.1968.229159","article-title":"ILLIAC IV software and application programming","volume":"C-17","author":"Kuck","year":"1968","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB12","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/T-C.1975.224157","article-title":"Access and alignment of data in an array processor","volume":"C-24","author":"Lawrie","year":"1975","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB13","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1145\/633625.52427","article-title":"Scrambled storage for parallel memory systems","author":"Lee","year":"1988","journal-title":"Internat. Sympos. Comput. Architecture"},{"key":"10.1016\/0743-7315(92)90116-5_BIB14","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/TC.1985.6312199","article-title":"On the effective bandwidth of interleaved memories in vector processor systems","volume":"C-34","author":"Oed","year":"1985","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB15","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TC.1986.1676813","article-title":"An efficient memory system for image processing","volume":"C-35","author":"Park","year":"1986","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB16","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TC.1978.1675122","article-title":"Theoretical limitations on the effective use of parallel memories","volume":"C-27","author":"Shapiro","year":"1978","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB17","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/TC.1978.1675045","article-title":"Memory systems for image processing","volume":"C-27","author":"van Voorhis","year":"1978","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB18","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TC.1985.5009402","article-title":"The structure of periodic storage schemes for parallel memories","volume":"C-34","author":"Wijshoff","year":"1985","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0743-7315(92)90116-5_BIB19","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TC.1987.1676887","article-title":"On linear skewing schemes and d-ordered vectors","volume":"C-36","author":"Wijshoff","year":"1987","journal-title":"IEEE Trans. Comput."}],"container-title":["Journal of Parallel and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0743731592901165?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0743731592901165?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T14:30:19Z","timestamp":1757514619000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0743731592901165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,2]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1992,2]]}},"alternative-id":["0743731592901165"],"URL":"https:\/\/doi.org\/10.1016\/0743-7315(92)90116-5","relation":{},"ISSN":["0743-7315"],"issn-type":[{"type":"print","value":"0743-7315"}],"subject":[],"published":{"date-parts":[[1992,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Conflict-free access to parallel memories","name":"articletitle","label":"Article Title"},{"value":"Journal of Parallel and Distributed Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/0743-7315(92)90116-5","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 1992 Published by Elsevier Inc.","name":"copyright","label":"Copyright"}]}}