{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T03:04:27Z","timestamp":1648782267267},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[1996,11,1]],"date-time":"1996-11-01T00:00:00Z","timestamp":846806400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[1996,11]]},"DOI":"10.1007\/bf01293262","type":"journal-article","created":{"date-parts":[[2005,3,25]],"date-time":"2005-03-25T03:41:51Z","timestamp":1111722111000},"page":"439-447","source":"Crossref","is-referenced-by-count":1,"title":["Low redundancy polynomial checks for numerical computation"],"prefix":"10.1007","volume":"7","author":[{"given":"F. S.","family":"Vainstein","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF01293262_CR1","volume-title":"Fault Tolerant & Fault Testable Hardware design","author":"K. Lala Parag","year":"1985","unstructured":"Lala Parag K.: Fault Tolerant & Fault Testable Hardware design. Prentice-Hall International, London 1985"},{"key":"BF01293262_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-39568-7","volume-title":"Advances in Cryptology: Proceedings of Cripto 84","author":"G. R. Blakley","year":"1985","unstructured":"Blakley, G. R., Meadows, C.: Security of Ramp Schemes pp. 242\u2013268 in the book \u201cAdvances in Cryptology: Proceedings of Cripto 84. Blakley G. R., Chaum, D. (eds) Vol. 196 of Lecture Notes in Computer Science). Berlin, Heidelberg, New York: Springer 1985"},{"key":"BF01293262_CR3","doi-asserted-by":"crossref","unstructured":"Asumth, C. A. Blakley, G. R.: Polling splitting and restituting information to overcome total failure of some channels of communication. Proc. of the 1982 Symposium on Security and Privacy. IEEE Society, pp. 156\u2013169","DOI":"10.1109\/SP.1982.10019"},{"key":"BF01293262_CR4","unstructured":"Siewiorek, D. P., Swarz, R. S.: The Theory and Practice of Reliable System Design, Digital Press, 1982"},{"issue":"1","key":"BF01293262_CR5","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1049\/ij-cdt.1979.0011","volume":"2","author":"M. G. Karpovsky","year":"1979","unstructured":"Karpovsky, M. G.: Error Detection for Polynomial Computations. IEEE J. Comput. Digital Tech. 2, (1), 49\u201356 (1979)","journal-title":"IEEE J. Comput. Digital Tech."},{"issue":"2","key":"BF01293262_CR6","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1049\/ip-e.1980.0013","volume":"127","author":"M. G. Karpovsky","year":"1980","unstructured":"Karpovsky, M. G.: Testing for Numerical Computations, IEEE Proc. E. Comput. Digital Tech. 127, (2), 69\u201376 (1980)","journal-title":"IEEE Proc. E. Comput. Digital Tech."},{"key":"BF01293262_CR7","doi-asserted-by":"crossref","unstructured":"Karpovsky, M. G.: Detection and Location of errors by Linear Inequality Checks. IEEE Proc, vol. 129, Pt. E, No. 3, 1982","DOI":"10.1049\/ip-e.1982.0018"},{"key":"BF01293262_CR8","volume-title":"Algebra","author":"S. Lang","year":"1992","unstructured":"Lang, S.: Algebra London: Addison-Wesley 1992"},{"key":"BF01293262_CR9","volume-title":"Lecture Notes in Computer Science vol. 539","author":"F. S. Vainstein","year":"1991","unstructured":"Vainstein, F. S.: Error Detection and Correction in Numerical Computations by Algebraic Methods. Lecture Notes in Computer Science vol. 539. Berlin, Heidelberg, New York: Springer 1991"},{"key":"BF01293262_CR10","doi-asserted-by":"crossref","unstructured":"Blum, M., Kannan, S.: Designing Programs That Check Their Work. 21st ACM Symposium on Theory of Computing, pp. 86\u201397 (1989)","DOI":"10.1145\/73007.73015"},{"key":"BF01293262_CR11","doi-asserted-by":"crossref","unstructured":"Blum, M., Luby, M., Rubinfeld, R.: Self-Testing and Self-Correcting Programs with Applications to Numerical Problems, 22nd ACM Symposium on Theory of Computing, pp. 73\u201383 (1990)","DOI":"10.1145\/100216.100225"},{"key":"BF01293262_CR12","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970906","volume-title":"Methods and Applications of Interval Analysis","author":"R. E. Moore","year":"1979","unstructured":"Moore, R. E.: Methods and Applications of Interval Analysis, SIAM, Philadelphia, 1979"},{"key":"BF01293262_CR13","doi-asserted-by":"crossref","unstructured":"Neumaier, A.: Interval Methods for Systems of Equations, Cambridge University Press (1990)","DOI":"10.1017\/CBO9780511526473"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01293262.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01293262\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01293262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T13:48:43Z","timestamp":1586180923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01293262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,11]]},"references-count":13,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1996,11]]}},"alternative-id":["BF01293262"],"URL":"https:\/\/doi.org\/10.1007\/bf01293262","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996,11]]}}}