{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:55:31Z","timestamp":1743108931678,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":13,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132219873"},{"type":"electronic","value":"9788132219880"}],"license":[{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-1988-0_11","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T08:45:57Z","timestamp":1409042757000},"page":"183-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area"],"prefix":"10.1007","author":[{"given":"Ranjan","family":"Mehera","sequence":"first","affiliation":[]},{"given":"Arpan","family":"Chakrabarty","sequence":"additional","affiliation":[]},{"given":"Piyali","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,27]]},"reference":[{"issue":"2","key":"11_CR1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/BF01553884","volume":"4","author":"C Bajaj","year":"1989","unstructured":"Bajaj, C., Kim, M.-S.: Generation of configuration space obstacles: The case of a moving algebraic curves. Algorithmica 4(2), 157\u2013172 (1989)","journal-title":"Algorithmica"},{"key":"11_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03427-9","volume-title":"Computational Geometry: Algorithms and Applications","author":"M de Berg","year":"1997","unstructured":"de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications. Springer, Berlin (1997)"},{"key":"11_CR3","unstructured":"Hernandez-Barrera, A.: Computing the minkowski sum of monotone polygons. IEICE Trans. Inf. Syst. E80-D(2), 218\u2013222 (1996)"},{"key":"11_CR4","volume-title":"An Introduction to Geographical Information Systems","author":"I Heywood","year":"1998","unstructured":"Heywood, I., Cornelius, S., Carver, S.: An Introduction to Geographical Information Systems. Addison Wesley Longman, New York (1998)"},{"key":"11_CR5","volume-title":"Computer Architecture and Parallel Processing","author":"K Hwang","year":"1984","unstructured":"Hwang, K., Briggs, F.A.: Computer Architecture and Parallel Processing. McGraw-Hill, New York (1984)"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1006\/gmip.1998.0464","volume":"60","author":"I-K Lee","year":"1998","unstructured":"Lee, I.-K., Kimand, M.-S., Elber, G.: Polynomial\/rational approximation of minkowski sum boundary curves. Graph. Models Image Process. 60(2), 136\u2013165 (1998). (Article No: IP970464)","journal-title":"Graph. Models Image Process."},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1006\/jagm.2000.1092","volume":"37","author":"SC Nandy","year":"2000","unstructured":"Nandy, S.C., Bhattacharya, B.B., Hernandez-Barrera, A.: Safety zone problem. J. Algorithms 37, 538\u2013569 (2000)","journal-title":"J. Algorithms"},{"key":"11_CR8","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Curve_orientation"},{"key":"11_CR9","unstructured":"Mehera, R., Chatterjee, S., Pal, R.K.: A time-optimal algorithm for guard zone problem. In: Proceedings of 22nd IEEE Region 10 International Conference on Intelligent Information Communication Technologies for Better Human Life (IEEE TENCON 2007), CD: Session: ThCP-P.2 (Computing) (Four pages). Taipei, Taiwan (2007)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Mehera, R., Pal, R.K.: A cost-optimal algorithm for guard zone problem. In: Proceedings of 10th International Conference on Distributed Computing and Networking (ICDCN 2009), pp. 91\u201398. Hyderabad, India (2009)","DOI":"10.1007\/978-3-540-92295-7_14"},{"issue":"3","key":"11_CR11","first-page":"14","volume":"II","author":"R Mehera","year":"2008","unstructured":"Mehera, R., Chatterjee, S., Pal, R.K.: Yet another linear time algorithm for guard zone problem. Icfai J. Comput. Sci. II(3), 14\u201323 (2008)","journal-title":"Icfai J. Comput. Sci."},{"issue":"4","key":"11_CR12","first-page":"737","volume":"20","author":"MT Goodrich","year":"1991","unstructured":"Goodrich, M.T.: Intersecting line segments in parallel with an output-sensitive number of processors. Soc. Ind. Appl. Math. 20(4), 737\u2013755 (1991)","journal-title":"Soc. Ind. Appl. Math."},{"key":"11_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03427-9","volume-title":"Computational Geometry: Algorithms and Applications","author":"M de Berg","year":"1997","unstructured":"de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications. Springer, Berlin (1997)"}],"container-title":["Advances in Intelligent Systems and Computing","Applied Computation and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1988-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T21:31:25Z","timestamp":1676410285000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1988-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,27]]},"ISBN":["9788132219873","9788132219880"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1988-0_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,8,27]]},"assertion":[{"value":"27 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}