Exploiting Seek Overlap
1982 ◽
pp. 229-240