Key points are not available for this paper at this time.
Methods for entering random-access files on the basis of one key are briefly surveyed. The widely used chaining method, based on a pseudo-random key transformation, is reviewed in more detail. An efficient generalization of the chaining method which permits recovery on additional keys is then presented.
Building similarity graph...
Analyzing shared references across papers
Loading...
Liaquat Roopesh Johnson (Mon,) studied this question.
www.synapsesocial.com/papers/6a07ee5509b3c820153787c1 — DOI: https://doi.org/10.1145/366532.366540
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context:
Liaquat Roopesh Johnson
Communications of the ACM
Alliance for Safe Kids
Building similarity graph...
Analyzing shared references across papers
Loading...