{"id":"https://openalex.org/W2100204172","doi":"https://doi.org/10.1109/dcc.2008.101","title":"All-Match LZ77 Bit Recycling","display_name":"All-Match LZ77 Bit Recycling","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2100204172","doi":"https://doi.org/10.1109/dcc.2008.101","mag":"2100204172"},"language":"en","primary_location":{"id":"doi:10.1109/dcc.2008.101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcc.2008.101","pdf_url":null,"source":{"id":"https://openalex.org/S4210220829","display_name":"DCC","issn_l":"1068-0314","issn":["1068-0314","2375-0359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Data Compression Conference (dcc 2008)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110192887","display_name":"Danny Dub\ufffd","orcid":null},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Danny Dub","raw_affiliation_strings":["Universit\u00e9 Laval, Canada"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Laval, Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046976573","display_name":"Vincent Beaudoin","orcid":null},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Vincent Beaudoin","raw_affiliation_strings":["Universit\u00e9 Laval, Canada"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Laval, Canada","institution_ids":["https://openalex.org/I43406934"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110192887"],"corresponding_institution_ids":["https://openalex.org/I43406934"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08823196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"513","last_page":"513"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7467912435531616},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.7365412712097168},{"id":"https://openalex.org/keywords/multiplicity","display_name":"Multiplicity (mathematics)","score":0.6501011848449707},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6171183586120605},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4386626183986664},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42301246523857117},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.37592750787734985},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34714949131011963},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3395935893058777},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14172467589378357},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11504331231117249},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07095089554786682}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7467912435531616},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.7365412712097168},{"id":"https://openalex.org/C156004811","wikidata":"https://www.wikidata.org/wiki/Q2228257","display_name":"Multiplicity (mathematics)","level":2,"score":0.6501011848449707},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6171183586120605},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4386626183986664},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42301246523857117},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.37592750787734985},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34714949131011963},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3395935893058777},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14172467589378357},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11504331231117249},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07095089554786682},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dcc.2008.101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcc.2008.101","pdf_url":null,"source":{"id":"https://openalex.org/S4210220829","display_name":"DCC","issn_l":"1068-0314","issn":["1068-0314","2375-0359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Data Compression Conference (dcc 2008)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1991615886"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2],"given.":[3],"Recently,":[4],"a":[5,73,162,182],"technique":[6,163],"called":[7,175,189],"bit":[8],"recycling":[9],"(BR)":[10],"was":[11],"introduced":[12],"to":[13,28,36,61,110,122,130,134],"help":[14],"reduce":[15,64],"the":[16,20,39,65,88,95,105,120,151,169],"redundancy":[17],"caused":[18],"by":[19,154],"multiplicity":[21,53,66],"of":[22,41,54,59,138,171],"encodings.":[23],"It":[24,77],"has":[25,98,119],"been":[26],"used":[27],"improve":[29],"LZ77":[30],"compression,":[31],"which":[32],"is":[33,108,140],"especially":[34],"prone":[35],"allow":[37],"for":[38,46],"existence":[40,170],"numerous":[42],"different":[43],"compressed":[44,152],"files":[45],"some":[47,85],"given":[48],"original":[49],"file":[50,153],"F.":[51],"The":[52,114,136],"encodings":[55],"causes":[56],"redundancy.":[57],"Instead":[58],"trying":[60],"eliminate":[62],"or":[63],"itself,":[67],"BR":[68,139,177,191],"exploits":[69,194],"it":[70,129,142],"and":[71,103,185],"extracts":[72],"compensation":[74],"from":[75],"it.":[76],"uses":[78],"implicit":[79],"communication":[80],"that":[81,112,117,141,164,193],"happens":[82],"when,":[83],"at":[84],"point":[86],"in":[87,150],"compression":[89],"process,":[90],"we":[91],"have":[92],"that:":[93],"1.":[94],"compressor":[96],"C":[97,118],"more":[99,183,186],"than":[100],"one":[101,124],"option;":[102],"2.":[104],"decompressor":[106],"D":[107],"able":[109],"recognize":[111],"situation.":[113],"mere":[115],"fact":[116],"liberty":[121],"select":[123],"among":[125],"many":[126,146],"options":[127],"allows":[128],"implicitly":[131,155],"send":[132],"bits":[133,147,166],"D.":[135],"particularity":[137],"avoids":[143],"storing":[144],"as":[145,148],"possible":[149],"sending":[156],"them":[157],"instead.":[158],"Previous":[159],"work":[160,180],"presented":[161],"recycles":[165],"based":[167],"on":[168],"multiple":[172],"longest":[173],"matches,":[174],"longest-match":[176],"(LMBR).":[178],"This":[179],"presents":[181],"general,":[184],"powerful,":[187],"technique,":[188],"all-match":[190],"(AMBR)":[192],"shorter":[195],"matches.":[196]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
