{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:59:53Z","timestamp":1729609193703,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.125","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"page":"1023-1030","source":"Crossref","is-referenced-by-count":1,"title":["The Buffered Edge Reconfigurable Cell Array and Its Applications"],"prefix":"10.1109","author":[{"given":"Rui","family":"Shan","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jungang","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ASICON.2011.6157315"},{"journal-title":"Software Defined Radio Architectures Systems and Functions","year":"2003","author":"dillinger","key":"17"},{"journal-title":"Green Software Defined Radios","year":"2009","author":"perre der l van","key":"18"},{"key":"15","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.1016\/S0167-8191(99)00070-8","article-title":"Advances in the dataflow computational model","volume":"25","author":"najjar","year":"1999","journal-title":"Parallel Computing"},{"journal-title":"VLSI Arrays Processors","year":"1987","author":"kung","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2012.35"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/27633.28055"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/92.766747"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/12.73588"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/43.238043"},{"key":"20","first-page":"22","article-title":"Programmable hardware and the new analog capacity","author":"ginma","year":"2007","journal-title":"Systems"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/78.950794"},{"key":"23","article-title":"Algorithms for drawing graphs: An annotated bibliography","author":"eades","year":"1989","journal-title":"Tech Report CS-89-09 Dept Computer Science Queensland University Australia"},{"key":"24","first-page":"229","article-title":"On straight-line representation of planar graphs","volume":"11","author":"fa?ry","year":"1948","journal-title":"Acta Sci Math (Szeged)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1142\/5648"},{"year":"0","key":"26"},{"key":"27","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TCS.1986.1085997","article-title":"On maximal planarization of non-planar graphs","volume":"33","author":"jayakumar","year":"1986","journal-title":"IEEE Transactions on Circuits Systems"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/31.1746"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2002.1187005"},{"journal-title":"Introduction to Reconfigurable Computing Architectures Algorithms and Applications","year":"2007","author":"bobda","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/508352.508353"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF02088008"},{"journal-title":"Advanced FPGA Design Architecture Implementation and Optimization","year":"2006","author":"kilts","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1981.1163535"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676652"},{"key":"6","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF02477176","article-title":"The mapping of linear recurrence equations on regular arrays","volume":"1","author":"quinton","year":"1989","journal-title":"The Journal of VLSI Signal Processing"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6505-7"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e89-b.12.3179"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/2.7055"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1985.1662798"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680945.pdf?arnumber=6680945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:26:39Z","timestamp":1498105599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680945\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.125","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}