{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:04:38Z","timestamp":1757624678461,"version":"3.44.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032014740"},{"type":"electronic","value":"9783032014757"}],"license":[{"start":{"date-parts":[[2025,8,17]],"date-time":"2025-08-17T00:00:00Z","timestamp":1755388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,17]],"date-time":"2025-08-17T00:00:00Z","timestamp":1755388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01475-7_3","type":"book-chapter","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T17:39:17Z","timestamp":1755365957000},"page":"30-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Analysis of\u00a0Deletion Closure Operations and\u00a0Their Properties"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5265-8520","authenticated-orcid":false,"given":"Da-Jung","family":"Cho","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4779-3143","authenticated-orcid":false,"given":"Tikhon","family":"Pshenitsyn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Abroshan, M., Venkataramanan, R., Dolecek, L., Guill\u00e9n i\u00a0Fabregas, A.: Coding for deletion channels with multiple traces. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp. 1372\u20131376. IEEE (2019)","DOI":"10.1109\/ISIT.2019.8849647"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1911","DOI":"10.1038\/s41467-018-04252-2","volume":"9","author":"M Adli","year":"2018","unstructured":"Adli, M.: The CRISPR tool kit for genome editing and beyond. Nat. Commun. 9(1), 1911 (2018)","journal-title":"Nat. Commun."},{"key":"3_CR3","unstructured":"Benne, R.: RNA Editing: the Alteration of Protein Coding Sequences of RNA. Ellis Horwood Series in Molecular Biology. Ellis Horwood, New York (1993)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Cho, D.-J., Han, Y.-S., Kim, H., Salomaa, K.: Site-directed deletion. In: Developments in Language Theory, pp. 219\u2013230 (2018)","DOI":"10.1007\/978-3-319-98654-8_18"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.tcs.2004.01.002","volume":"314","author":"M Domaratzki","year":"2004","unstructured":"Domaratzki, M., Okhotin, A.: Representing recursively enumerable languages by iterated deletion. Theoret. Comput. Sci. 314(3), 451\u2013457 (2004)","journal-title":"Theoret. Comput. Sci."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Doudna, J.A., Charpentier, E.: The new frontier of genome engineering with CRISPR-Cas9. Science 346(6213), 1258096 (2014)","DOI":"10.1126\/science.1258096"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.tcs.2004.04.009","volume":"327","author":"D Hofbauer","year":"2004","unstructured":"Hofbauer, D., Waldmann, J.: Deleting string rewriting systems preserve regularity. Theoret. Comput. Sci. 327(3), 301\u2013317 (2004)","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0304-3975(96)00307-6","volume":"183","author":"M Ito","year":"1997","unstructured":"Ito, M., Kari, L., Thierrin, G.: Insertion and deletion closure of languages. Theoret. Comput. Sci. 183(1), 3\u201319 (1997)","journal-title":"Theoret. Comput. Sci."},{"key":"3_CR9","unstructured":"Ito, M., Silva, P.V.: Remark on deletions, scattered deletions and related operations on languages. In: Semigroups and Applications, pp. 97\u2013105 (1998)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jinek, M., Chylinski, K., Fonfara, I., Hauer, M., Doudna, J.A., Charpentier, E.: A programmable dual-RNA\u2013guided DNA endonuclease in adaptive bacterial immunity. Science 337(6096), 816\u2013821 (2012)","DOI":"10.1126\/science.1225829"},{"key":"3_CR11","unstructured":"Kari, L.: On Insertion and Deletion in Formal Languages. PhD thesis, University of Turku (1991)"},{"issue":"4","key":"3_CR12","first-page":"479","volume":"21","author":"L Kari","year":"1995","unstructured":"Kari, L., Thierrin, G.: K-insertion and k-deletion closure of languages. Soochow J. Math. 21(4), 479\u2013495 (1995)","journal-title":"Soochow J. Math."},{"issue":"2","key":"3_CR13","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1145\/322063.322075","volume":"25","author":"D Maier","year":"1978","unstructured":"Maier, D.: The complexity of some problems on subsequences and supersequences. J. ACM 25(2), 322\u2013336 (1978)","journal-title":"J. ACM"},{"issue":"1\u20132","key":"3_CR14","first-page":"53","volume":"180","author":"A Malcher","year":"2021","unstructured":"Malcher, A.: Decidability questions for insertion systems and related models. Fund. Inform. 180(1\u20132), 53\u201376 (2021)","journal-title":"Fund. Inform."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"McRae, E.K.S., et al.: Structure, folding and flexibility of co-transcriptional RNA origami. Nature Nanotechnol. 18(7), 808\u2013817 (2023)","DOI":"10.1038\/s41565-023-01321-6"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"P\u0103un, G., Rozenberg, G., Salomaa, A.: DNA Computing: New Computing Paradigms. Springer, Heidelberg (1998)","DOI":"10.1007\/978-3-662-03563-4"},{"key":"3_CR17","unstructured":"\u010cerno, P.: Restricted Restarting Automata. PhD thesis, Charles University in Prague (2015)"}],"container-title":["Lecture Notes in Computer Science","Developments in Language Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01475-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T15:10:38Z","timestamp":1757430638000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01475-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,17]]},"ISBN":["9783032014740","9783032014757"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01475-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,17]]},"assertion":[{"value":"17 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DLT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Developments in Language Theory","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dlt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cida.uos.ac.kr\/dlt2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}