{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T19:13:20Z","timestamp":1726168400293},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/hpec.2016.7761587","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T16:44:07Z","timestamp":1480610647000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["KNN in the Jaccard space"],"prefix":"10.1109","author":[{"family":"Ming Ouyang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8137.1912.tb05611.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0092409"},{"article-title":"Hamming Weight","year":"2009","author":"lauradoux","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/234034a0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25087-8_25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.89"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2018323.2018338"},{"journal-title":"OpenMP API","year":"0","key":"ref17"},{"journal-title":"POSIX Threades Programming","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408667"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref3","article-title":"HAKMEM","author":"beeler","year":"1972","journal-title":"MIT AI Memo 239"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5654017"},{"journal-title":"General-Purpose SIMD within a Register Parallel Processing on Consumer Microprocessors","year":"2003","author":"fisher","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1021\/ci200235e"},{"key":"ref7","first-page":"518","article-title":"Similarity Search in High Dimensions via Hashing","author":"gionis","year":"1999","journal-title":"Proceedings of VLDB"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23400-2_35"},{"article-title":"Bit Twiddling Hacks","year":"0","author":"anderson","key":"ref1"},{"journal-title":"Intel intrinsics guide","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004395"},{"key":"ref22","first-page":"194","article-title":"A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces","author":"weber","year":"1998","journal-title":"Proceedings of VLDB"},{"journal-title":"Hacker's Delight","year":"2012","author":"warren","key":"ref21"}],"event":{"name":"2016 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2016,9,13]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2016,9,15]]}},"container-title":["2016 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7748303\/7761574\/07761587.pdf?arnumber=7761587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,23]],"date-time":"2016-12-23T21:38:25Z","timestamp":1482529105000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7761587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/hpec.2016.7761587","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}