{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T14:10:02Z","timestamp":1689689402123},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Synthesis Lectures on Digital Circuits and Systems"],"published-print":{"date-parts":[[2014,11,10]]},"DOI":"10.2200\/s00612ed1v01y201411dcs045","type":"journal-article","created":{"date-parts":[[2014,11,25]],"date-time":"2014-11-25T02:27:22Z","timestamp":1416882442000},"page":"1-123","source":"Crossref","is-referenced-by-count":4,"title":["Applications of Zero-Suppressed Decision Diagrams"],"prefix":"10.1007","volume":"9","author":[{"given":"Tsutomu","family":"Sasao","sequence":"first","affiliation":[]},{"given":"Jon T.","family":"Butler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008699807402"},{"key":"p_3","doi-asserted-by":"crossref","unstructured":"V. Bertacco, S. Minato, R. Verplaetse, L. Benini, G. De Micheli, \"Decision diagrams and pass transistor logic synthesis,\" Technical Report CSL-TR-97-748. Computer System Laboratory. Stanford University. December 1997. DOI: 10.1002\/cta.822. 2, 2310.1002\/cta.822","DOI":"10.1002\/cta.822"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674912"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1007\/10721959_35"},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1993.203919"},{"key":"p_8","first-page":"179","author":"Coudert O.","year":"1989","journal-title":"North-Holland"},{"key":"p_9","volume-title":"Proc. of SASIMI '93","author":"Coudert O."},{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9260(94)00007-7"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1145\/313651.313674"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1996.510538"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1996.563589"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1109\/EDTC.1997.582363"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.1998.655954"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.1995.486250"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1145\/2483028.2483138"},{"key":"p_20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2622-0","volume-title":"Synthesis of Finite State Machines: Functional Optimization","author":"Kam T.","year":"1997"},{"key":"p_21","first-page":"64","volume-title":"Proc. of SASIMI '92 (Synthesis and Simulation Meeting and International Interchange)","author":"Minato S."},{"key":"p_22","doi-asserted-by":"publisher","DOI":"10.1145\/157485.164890"},{"key":"p_23","doi-asserted-by":"publisher","DOI":"10.1109\/43.494701"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1145\/196244.196446"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1109\/EDTC.1995.470321"},{"key":"p_27","volume-title":"Binary Decision Diagrams and Applications for VLSI CAD","author":"Minato S.","year":"1995"},{"key":"p_28","doi-asserted-by":"publisher","DOI":"10.1109\/43.494701"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1385-4"},{"key":"p_30","doi-asserted-by":"publisher","DOI":"10.1145\/288548.288586"},{"key":"p_31","doi-asserted-by":"crossref","unstructured":"A. Mishchenko, \"An introduction to zero-suppressed binary decision diagrams,\", Technical Report, Portland State University, June 2001. 1","DOI":"10.1007\/978-3-031-79870-2_1"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1970.222967"},{"key":"p_34","first-page":"12","volume":"79","author":"Ochi H.","year":"1996","journal-title":"IEICE Trans. Fundamentals"},{"key":"p_35","first-page":"12","volume":"79","author":"Ochi H.","year":"1996","journal-title":"IEICE Trans. Fundamentals"},{"key":"p_36","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00067-2"},{"key":"p_37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5139-3"},{"key":"p_38","first-page":"260","volume-title":"Proc. of IWLS '99","author":"Sawada H."},{"key":"p_40","doi-asserted-by":"crossref","unstructured":"G. Swamy, R. Brayton, and P. McGeer, \"A fully implicit Quine-McCluskey procedure using BDD's,\" Tech. Report No. UCB\/ERL M92\/127, 1992. 1","DOI":"10.2139\/ssrn.3702945"},{"key":"p_41","first-page":"1","volume":"00","author":"Tomisaka M.","year":"1999","journal-title":"IEICE Trans. Fundamentals"},{"key":"p_42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6155-2"},{"key":"p_43","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0031826"},{"key":"p_44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-2821-6"},{"key":"p_45","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1992.227866"},{"key":"p_46","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1970.222967"},{"key":"p_47","first-page":"6","volume":"76","author":"Minato S.","year":"1993","journal-title":"IEICE Trans. Fundamentals"},{"key":"p_48","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1975.224338"},{"key":"p_49","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5139-3"},{"key":"p_50","doi-asserted-by":"publisher","DOI":"10.1109\/12.954508"},{"key":"p_51","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"p_52","volume-title":"Time with class! let's count!","author":"Doi Seiji","year":"2012"},{"key":"p_53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/3-540-61332-3_140","volume-title":"Jin-Yi Cai and ChakKuen Wong","author":"Imai Hiroshi","year":"1996"},{"key":"p_54","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2288976"},{"key":"p_56","first-page":"57","volume":"10","author":"Iwashita Hiroaki","year":"2013","journal-title":"Hokkaido University, Division of Computer Science, TCS Technical Reports, TCSTR-A-"},{"key":"p_57","first-page":"55","volume":"50","author":"Knuth D. E.","year":"2009","journal-title":"Addison-Wesley"},{"key":"p_58","doi-asserted-by":"publisher","DOI":"10.1145\/157485.164890"},{"key":"p_59","first-page":"1","volume-title":"Proceedings of the 2013 Reed-Muller Workshop (RM-2013)","author":"Minato S.","year":"2014"},{"key":"p_60","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0015401"},{"key":"p_61","doi-asserted-by":"crossref","unstructured":"N. J. A. Sloane, \"e on-line encyclopedia of integer sequences,\" http:\/\/oeis.org\/. DOI: 10.1007\/978-3-540-73086-6_12. 57, 5810.1007\/978-3-540-73086-6_12","DOI":"10.1007\/978-3-540-73086-6_12"},{"key":"p_62","first-page":"372","volume":"186","author":"Welsh D. J. A.","year":"1993","journal-title":"London Mathematical Society Lecture Note Series"},{"key":"p_63","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675141"},{"key":"p_64","volume-title":"Computer Algorithms: String Pattern Matching Strategies","author":"Aoe J.","year":"1994"},{"key":"p_65","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323573"},{"key":"p_66","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2006.270302"},{"key":"p_67","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1990.114826"},{"key":"p_68","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"p_69","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2008.4580165"},{"key":"p_70","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2892-7"},{"key":"p_71","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452339"},{"key":"p_72","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2089639"},{"key":"p_73","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1980.1653338"},{"key":"p_74","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.21"},{"key":"p_75","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2008.4762368"},{"key":"p_76","volume-title":"Introduction to Automata eory, Languages, and Computation","author":"Hopcroft J. E.","year":"2000","edition":"2"},{"key":"p_77","doi-asserted-by":"publisher","DOI":"10.1145\/224818.224930"},{"key":"p_78","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2010.5681536"},{"key":"p_79","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159952"},{"key":"p_80","doi-asserted-by":"publisher","DOI":"10.1109\/12.46285"},{"key":"p_81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58940-9"},{"key":"p_82","doi-asserted-by":"publisher","DOI":"10.1145\/157485.164890"},{"key":"p_83","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.30"},{"key":"p_84","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"p_85","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675378"},{"key":"p_86","first-page":"5","volume":"87","author":"Nagayama S.","year":"2004","journal-title":"IEICE Trans. on Fundamentals"},{"key":"p_87","first-page":"48","volume-title":"Proceedings of the 2013 Reed-Muller Workshop (RM-2013)","author":"Nagayama S.","year":"2014"},{"key":"p_88","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2012.05.009"},{"key":"p_89","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316135228","volume-title":"Flexible Pattern Matching in Strings","author":"Navarro G.","year":"2002"},{"key":"p_90","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1993.580029"},{"key":"p_91","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.19"},{"key":"p_92","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5139-3"},{"key":"p_93","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2001.22"},{"key":"p_94","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402983"},{"key":"p_95","volume-title":"SNORT network intrusion detection system","author":"Sourcefire Inc.","year":"2013"},{"key":"p_96","volume-title":"April","author":"Somenzi F.","year":"2014"},{"key":"p_97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30117-2_50"},{"key":"p_98","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"p_99","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2011.36"},{"key":"p_100","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2008.4629920"},{"key":"p_101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_4"},{"key":"p_102","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934986"},{"key":"p_103","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2011.73"},{"key":"p_104","volume-title":"Decision Diagram Techniques for Micro- and Nanoelectronic Design","author":"Yanushkevich S. N.","year":"2006"},{"key":"p_105","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2005.1515762"}],"container-title":["Synthesis Lectures on Digital Circuits and Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T13:48:49Z","timestamp":1689688129000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.morganclaypool.com\/doi\/abs\/10.2200\/S00612ED1V01Y201411DCS045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,10]]},"references-count":98,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,11,10]]}},"alternative-id":["10.2200\/S00612ED1V01Y201411DCS045"],"URL":"https:\/\/doi.org\/10.2200\/s00612ed1v01y201411dcs045","relation":{},"ISSN":["1932-3166","1932-3174"],"issn-type":[{"value":"1932-3166","type":"print"},{"value":"1932-3174","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,10]]}}}