{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:58:14Z","timestamp":1760245094612,"version":"build-2065373602"},"reference-count":11,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2016,12,15]],"date-time":"2016-12-15T00:00:00Z","timestamp":1481760000000},"content-version":"vor","delay-in-days":1475,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"name":"NSF Science & Technology Center for Science of Information","award":["CCF-0939370"],"award-info":[{"award-number":["CCF-0939370"]}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Mathematics Letters"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1016\/j.aml.2012.06.005","type":"journal-article","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T20:34:48Z","timestamp":1340051688000},"page":"2218-2222","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":16,"title":["Asymptotic distribution of two-protected nodes in random binary search trees"],"prefix":"10.1016","volume":"25","author":[{"given":"Hosam M.","family":"Mahmoud","sequence":"first","affiliation":[]},{"given":"Mark Daniel","family":"Ward","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.aml.2012.06.005_br000005","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.aml.2007.07.001","article-title":"Protected points in ordered trees","volume":"21","author":"Cheon","year":"2008","journal-title":"Applied Mathematics Letters"},{"key":"10.1016\/j.aml.2012.06.005_br000010","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1016\/j.aml.2010.10.045","article-title":"Protected points in k-ary trees","volume":"24","author":"Mansour","year":"2011","journal-title":"Applied Mathematics Letters"},{"key":"10.1016\/j.aml.2012.06.005_br000015","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1016\/j.aml.2011.11.017","article-title":"Notes on protected nodes in digital search trees","volume":"25","author":"Du","year":"2012","journal-title":"Applied Mathematics Letters"},{"key":"10.1016\/j.aml.2012.06.005_br000020","series-title":"The Art of Computer Programming","volume":"vol. 3","author":"Knuth","year":"1998"},{"year":"2000","series-title":"Sorting: A Distribution Theory","author":"Mahmoud","key":"10.1016\/j.aml.2012.06.005_br000025"},{"year":"1992","series-title":"Evolution of Random Search Trees","author":"Mahmoud","key":"10.1016\/j.aml.2012.06.005_br000030"},{"key":"10.1016\/j.aml.2012.06.005_br000035","doi-asserted-by":"crossref","first-page":"1260","DOI":"10.1214\/aoap\/1029962872","article-title":"Normal convergence problem? two moments and a recurrence may be the clues","volume":"9","author":"Pittel","year":"1999","journal-title":"The Annals of Applied Probability"},{"key":"10.1016\/j.aml.2012.06.005_br000040","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1093\/comjnl\/29.1.36","article-title":"The expected distribution of degrees in random binary search trees","volume":"29","author":"Mahmoud","year":"1986","journal-title":"The Computer Journal"},{"key":"10.1016\/j.aml.2012.06.005_br000045","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1002\/rsa.3240020305","article-title":"Limit laws for local counters in random binary search trees","volume":"2","author":"Devroye","year":"1991","journal-title":"Random Structures and Algorithms"},{"key":"10.1016\/j.aml.2012.06.005_br000050","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1215\/S0012-7094-48-01568-3","article-title":"The central limit theorem for dependent random variables","volume":"15","author":"Hoeffding","year":"1948","journal-title":"Duke Mathematical Journal"},{"year":"2008","series-title":"P\u00f3lya Urn Models","author":"Mahmoud","key":"10.1016\/j.aml.2012.06.005_br000055"}],"container-title":["Applied Mathematics Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893965912002789?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893965912002789?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:39:06Z","timestamp":1760240346000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0893965912002789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":11,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["S0893965912002789"],"URL":"https:\/\/doi.org\/10.1016\/j.aml.2012.06.005","relation":{},"ISSN":["0893-9659"],"issn-type":[{"type":"print","value":"0893-9659"}],"subject":[],"published":{"date-parts":[[2012,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Asymptotic distribution of two-protected nodes in random binary search trees","name":"articletitle","label":"Article Title"},{"value":"Applied Mathematics Letters","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.aml.2012.06.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2012 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}