{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T03:13:56Z","timestamp":1673320436300},"reference-count":22,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[1996,10]]},"DOI":"10.1137\/s0097539793255722","type":"journal-article","created":{"date-parts":[[2005,2,24]],"date-time":"2005-02-24T11:43:31Z","timestamp":1109245411000},"page":"936-955","source":"Crossref","is-referenced-by-count":4,"title":["The Tree Model for Hashing: Lower and Upper Bounds"],"prefix":"10.1137","volume":"25","author":[{"given":"Joseph","family":"Gil","sequence":"first","affiliation":[]},{"given":"Friedhelm Meyer","family":"Auf Der Heide","sequence":"additional","affiliation":[]},{"given":"Avi","family":"Wigderson","sequence":"additional","affiliation":[]}],"member":"351","reference":[{"key":"R1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(78)90014-5"},{"key":"R2","volume-title":"The probabilistic method","author":"Alon Noga","year":"1992"},{"key":"R3","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90045-X"},{"key":"R4","doi-asserted-by":"publisher","DOI":"10.1137\/0212046"},{"key":"R5","doi-asserted-by":"publisher","DOI":"10.1145\/1994.2205"},{"key":"R6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/29.5.436"},{"key":"R7","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729330"},{"key":"R8","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539791194094"},{"key":"R9","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0032018"},{"key":"R10","doi-asserted-by":"publisher","DOI":"10.1145\/828.1884"},{"key":"R12","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1994.1127"},{"key":"R15","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90214-I"},{"key":"R16","volume-title":"Urn models and their application","author":"Johnson Norman L.","year":"1977"},{"key":"R18","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(84)90036-1"},{"key":"R19","volume-title":"The art of computer programming. Volume 3","author":"Knuth Donald E.","year":"1973"},{"key":"R20","doi-asserted-by":"publisher","DOI":"10.2307\/2318994"},{"key":"R23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69672-5"},{"key":"R24","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(87)90040-X"},{"key":"R25","doi-asserted-by":"publisher","DOI":"10.1137\/0217029"},{"key":"R28","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359175"},{"key":"R30","doi-asserted-by":"publisher","DOI":"10.1145\/322261.322274"},{"key":"R31","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3836"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/S0097539793255722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,29]],"date-time":"2017-01-29T16:40:21Z","timestamp":1485708021000},"score":1,"resource":{"primary":{"URL":"http:\/\/epubs.siam.org\/doi\/10.1137\/S0097539793255722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,10]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1996,10]]}},"alternative-id":["10.1137\/S0097539793255722"],"URL":"https:\/\/doi.org\/10.1137\/s0097539793255722","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996,10]]}}}