The second, used by the common people, was made from the bread-fruit tree, and the third from a tree resembling a fig-tree.
"Captain Cook" by W.H.G. Kingston
The elementary tree of any given link is composed of this link, which is then called the trunk of the elementary tree (see Fig. 4.11 (top)), and all links having the middle hit in common and with approximately the same values of track parameters (in this case we have only one track parameter: the slope of the link).
Study of accelerator neutrino interactions in a liquid argon TPC
When a new IP appears in the blacklist, only one intermediate node needs to be added to the LCP-tree: the one corresponding to the longest common preﬁx between the new node the and its “closest” IP already in the blacklist (gray node in Fig.3).
Optimal Filtering of Malicious IP Sources
The key point is that we only need to add one new intermediate node to the LCP tree (the gray node in Fig. 3), corresponding to the longest common pre ﬁx between the new bad address and its closest bad address that is already in the LCP tree.
Optimal Source-Based Filtering of Malicious Traffic