{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T23:35:41Z","timestamp":1723073741923},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,6,9]]},"DOI":"10.1145\/780542.780633","type":"proceedings-article","created":{"date-parts":[[2004,4,19]],"date-time":"2004-04-19T17:18:43Z","timestamp":1082395123000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Uniform hashing in constant time and linear space"],"prefix":"10.1145","author":[{"given":"Anna","family":"Ostlin","sequence":"first","affiliation":[{"name":"IT University of Copenhagen, Kobenhavn NV, Denmark"}]},{"given":"Rasmus","family":"Pagh","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Kobenhavn NV, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2003,6,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579166"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(86)90019-2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258639"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795288490"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703970"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335411"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1690"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.55"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646511.695324"},{"key":"e_1_3_2_1_11_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/3-540-55719-9_77","volume-title":"Proceedings of the 19th International Colloquium on Automata, Languages and Programming (ICALP '92)","author":"Dietzfelbinger M.","year":"1992","unstructured":"M. Dietzfelbinger , J. Gil , Y. Matias , and N. Pippenger . Polynomial hash functions are reliable (extended abstract) . In Proceedings of the 19th International Colloquium on Automata, Languages and Programming (ICALP '92) , volume 623 of Lecture Notes in Computer Science , pages 235 -- 246 . Springer-Verlag , 1992 .]] M. Dietzfelbinger, J. Gil, Y. Matias, and N. Pippenger. Polynomial hash functions are reliable (extended abstract). In Proceedings of the 19th International Colloquium on Automata, Languages and Programming (ICALP '92), volume 623 of Lecture Notes in Computer Science, pages 235--246. Springer-Verlag, 1992.]]"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/BFb0032018","volume-title":"Proceedings of the 17th International Colloquium on Automata, Languages and Programming (ICALP '90)","author":"Dietzfelbinger M.","year":"1990","unstructured":"M. Dietzfelbinger and F. Meyer auf der Heide. A new universal class of hash functions and dynamic hashing in real time . In Proceedings of the 17th International Colloquium on Automata, Languages and Programming (ICALP '90) , volume 443 of Lecture Notes in Computer Science , pages 6 -- 19 . Springer-Verlag , 1990 .]] M. Dietzfelbinger and F. Meyer auf der Heide. A new universal class of hash functions and dynamic hashing in real time. In Proceedings of the 17th International Colloquium on Automata, Languages and Programming (ICALP '90), volume 443 of Lecture Notes in Computer Science, pages 6--19. Springer-Verlag, 1990.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647823.736542"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780634"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/828.1884"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(199712)11:4%3C315::AID-RSA3%3E3.0.CO;2-1"},{"key":"e_1_3_2_1_17_1","volume-title":"Handbook of Algorithms and Data Structures","author":"Gonnet G.","year":"1984","unstructured":"G. Gonnet . Handbook of Algorithms and Data Structures . Addison-Wesley Publishing Co. , 1984 .]] G. Gonnet. Handbook of Algorithms and Data Structures. Addison-Wesley Publishing Co., 1984.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258656"},{"key":"e_1_3_2_1_19_1","unstructured":"D. E.\n Knuth\n . \n Sorting\n and \n Searching volume \n 3\n of \n The Art of Computer Programming\n . \n Addison-Wesley Publishing Co. Reading Mass\n . second\n edition 1998\n .]] D. E. Knuth. Sorting and Searching volume 3 of The Art of Computer Programming. Addison-Wesley Publishing Co. Reading Mass. second edition 1998.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009805"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647911.740481"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73041"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100245"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1989.63450"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796480"}],"event":{"name":"STOC03: The 35th Annual ACM Symposium on Theory of Computing","location":"San Diego CA USA","acronym":"STOC03","sponsor":["ACM Association for Computing Machinery","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the thirty-fifth annual ACM symposium on Theory of computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/780542.780633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T05:38:01Z","timestamp":1672983481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/780542.780633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6,9]]},"references-count":25,"alternative-id":["10.1145\/780542.780633","10.1145\/780542"],"URL":"https:\/\/doi.org\/10.1145\/780542.780633","relation":{},"subject":[],"published":{"date-parts":[[2003,6,9]]},"assertion":[{"value":"2003-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}