{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:56:21Z","timestamp":1759694181440,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3166072.3166080","type":"proceedings-article","created":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T14:50:46Z","timestamp":1513176646000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Efficient In-Memory, List-Based Text Inversion"],"prefix":"10.1145","author":[{"given":"David","family":"Hawking","sequence":"first","affiliation":[{"name":"Microsoft, Canberra, ACT, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bodo","family":"Billerbeck","sequence":"additional","affiliation":[{"name":"Microsoft, Melbourne, Victoria, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"volume-title":"Accessed","year":"2017","key":"e_1_3_2_1_1_1","unstructured":"AnandTech. Anandtech website. www.anandtech.com , Accessed 2017 . AnandTech. Anandtech website. www.anandtech.com, Accessed 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"Operating Systems: Three Easy Pieces","author":"Arpaci-Dusseau R. H.","year":"2015","unstructured":"R. H. Arpaci-Dusseau and A. C. Arpaci-Dusseau . Operating Systems: Three Easy Pieces . Arpaci-Dusseau Books , 0.90 edition, March 2015 . R. H. Arpaci-Dusseau and A. C. Arpaci-Dusseau. Operating Systems: Three Easy Pieces. Arpaci-Dusseau Books, 0.90 edition, March 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Information Retrieval: Implementing and evaluating search engines","author":"B\u00fcttcher S.","year":"2010","unstructured":"S. B\u00fcttcher , C. L. A. Clarke , and G. V. Cormack . Information Retrieval: Implementing and evaluating search engines . MIT Press , Cambridge, MA , 2010 . S. B\u00fcttcher, C. L. A. Clarke, and G. V. Cormack. Information Retrieval: Implementing and evaluating search engines. MIT Press, Cambridge, MA, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Accessed","author":"Fowler G.","year":"2015","unstructured":"G. Fowler , P. Vo , and L. C. Noll . FNV hash. Website , Accessed 13 July 2015 . www.isthe.com\/chongo\/tech\/comp\/fnv\/. Accessed 13 July 2015. G. Fowler, P. Vo, and L. C. Noll. FNV hash. Website, Accessed 13 July 2015. www.isthe.com\/chongo\/tech\/comp\/fnv\/. Accessed 13 July 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2198"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080789"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199012)41:8<581::AID-ASI4>3.0.CO;2-U"},{"volume-title":"Accessed","year":"2017","key":"e_1_3_2_1_9_1","unstructured":"Intel. Intel 64 and ia-32 architectures software developer manuals. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm , Accessed 2017 . Intel. Intel 64 and ia-32 architectures software developer manuals. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm, Accessed 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2749471"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564416"},{"key":"e_1_3_2_1_12_1","volume-title":"Documentation Incorporated","author":"Taube M.","year":"1953","unstructured":"M. Taube . Studies in coordinate indexing . Documentation Incorporated , 1953 . M. Taube. Studies in coordinate indexing. Documentation Incorporated, 1953."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2682862.2682870"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2537734.2537738"},{"key":"e_1_3_2_1_15_1","volume-title":"Human behavior and the principle of least effort","author":"Zipf G. K.","year":"1949","unstructured":"G. K. Zipf . Human behavior and the principle of least effort . Addison-Wesley , 1949 . G. K. Zipf. Human behavior and the principle of least effort. Addison-Wesley, 1949."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132956.1132959"}],"event":{"name":"ADCS 2017: The 22nd Australasian Document Computing Symposium","sponsor":["Queensland University of Technology","CSIRO Commonwealth Scientific and Industrial Research Organisation"],"location":"Brisbane QLD Australia","acronym":"ADCS 2017"},"container-title":["Proceedings of the 22nd Australasian Document Computing Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3166072.3166080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3166072.3166080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:55Z","timestamp":1750213615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3166072.3166080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":15,"alternative-id":["10.1145\/3166072.3166080","10.1145\/3166072"],"URL":"https:\/\/doi.org\/10.1145\/3166072.3166080","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]},"assertion":[{"value":"2017-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}