“…As a result, signature file methods have been proposed for applications for which these structures occur, such as prolog databases. Signature file methods have been proposed for multikey retrieval (Roberts, 1979;Sacks-Davis & Ramamohanarao, 1983;Sacks-Davis, 1985), text retrieval (Faloutsos & Christodoulakis, 1985;Faloutsos, 1985;Harrison, 1971) prolog systems (Colomb, 1985;Ramamohanarao & Shepherd, 1986;Wada, Morita, Yamazaki, Yamashita, Miyazaki, & Itoh, 1987;Wise & Powers, 1984), office systems Faloutsos & Christodoulakis, 1987;Rabitti & Zizka, 1984), statistical databases (Wong, Liu, Olken, Rotem, & Wong, 1985), and filtering methods (Bloom, 1970;McIiroy, 1982). Signature file methods are well suited to hardware implementation (Al!en et al, 1986;Berra et al, 1987).…”