{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T19:29:45Z","timestamp":1649186985509},"reference-count":22,"publisher":"Elsevier BV","issue":"9-10","license":[{"start":{"date-parts":[[1997,2,1]],"date-time":"1997-02-01T00:00:00Z","timestamp":854755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[1997,2]]},"DOI":"10.1016\/s1383-7621(96)00074-4","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:26:53Z","timestamp":1027636013000},"page":"743-760","source":"Crossref","is-referenced-by-count":1,"title":["Sub-optimal solutions to track detection problem using graph theoretic concepts"],"prefix":"10.1016","volume":"42","author":[{"given":"Stavros D.","family":"Nikolopoulos","sequence":"first","affiliation":[]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1383-7621(96)00074-4_bib1","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1145\/65950.65958","article-title":"Optimal bounds for decision problems on the CRCW PRAM","volume":"36","author":"Beame","year":"1989","journal-title":"J. Assoc. Comput. Mach."},{"key":"10.1016\/S1383-7621(96)00074-4_bib2","first-page":"225","article-title":"Tracking multiple targets using parallel processing","volume":"137","author":"Atherton","year":"1990"},{"key":"10.1016\/S1383-7621(96)00074-4_bib3","author":"Bellman","year":"1962"},{"key":"10.1016\/S1383-7621(96)00074-4_bib4","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/ASSP.1989.28061","article-title":"Algorithms and architectures for dynamic programming on Markov chains","volume":"37","author":"Bliss","year":"1989","journal-title":"IEEE Trans. ASSP"},{"key":"10.1016\/S1383-7621(96)00074-4_bib5","first-page":"405","article-title":"Efficient algorithms for finding the K best paths through a trellis","volume":"26","author":"Castanon","year":"1990","journal-title":"IEEE Trans. AES"},{"key":"10.1016\/S1383-7621(96)00074-4_bib6","first-page":"206","article-title":"Deterministic coin tossing and accelerating cascades: Micro and macro techniques for designing parallel algorithms","author":"Cole","year":"1986"},{"key":"10.1016\/S1383-7621(96)00074-4_bib7","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/TASSP.1982.1163992","article-title":"Time delay estimation via cross-correlation in the presence of large estimation error","volume":"30","author":"Ianniello","year":"1982","journal-title":"IEEE Trans. ASSP"},{"key":"10.1016\/S1383-7621(96)00074-4_bib8","first-page":"88","article-title":"Threshold effects in time delay estimation","volume":"21","author":"Ianniello","year":"1988","journal-title":"ACSSC"},{"key":"10.1016\/S1383-7621(96)00074-4_bib9","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0020-0190(82)90093-X","article-title":"Parallel computation and conflicts in memory access","volume":"14","author":"Kucera","year":"1982","journal-title":"Inf. Process. Lett."},{"key":"10.1016\/S1383-7621(96)00074-4_bib10","article-title":"Graph partitioning with applications to signal processing","author":"Lanfear","year":"1986"},{"key":"10.1016\/S1383-7621(96)00074-4_bib11","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/0031-3203(89)90006-X","article-title":"Improvements and systolic implementation of the hough transformation for straight line detection","volume":"22","author":"Li","year":"1989","journal-title":"Patttern Recognition"},{"key":"10.1016\/S1383-7621(96)00074-4_bib12","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/TAC.1977.1101500","article-title":"Application of 0\u20131 integer programming to multitarget tracking problems","volume":"22","author":"Morefield","year":"1977","journal-title":"IEEE Trans. AC"},{"key":"10.1016\/S1383-7621(96)00074-4_bib13","first-page":"230","article-title":"Sub-optimal approach to track detection for real-time systems","author":"Nikolopoulos","year":"1995"},{"key":"10.1016\/S1383-7621(96)00074-4_bib14","series-title":"ICT'96: International Conference on Telecommunications","first-page":"817","article-title":"Towards network survivability by finding the K-best paths through a trellis graph","author":"Nikolopoulos","year":"1996"},{"key":"10.1016\/S1383-7621(96)00074-4_bib15","doi-asserted-by":"crossref","first-page":"682","DOI":"10.1137\/0210051","article-title":"Fast efficient parallel algorithms for some graph problems","volume":"10","author":"Savage","year":"1981","journal-title":"SIAM J. Comput."},{"key":"10.1016\/S1383-7621(96)00074-4_bib16","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TAC.1981.1102775","article-title":"Aspects of dynamic programming in signal and image processing","volume":"26","author":"Scharf","year":"1981","journal-title":"IEEE Trans. AC"},{"key":"10.1016\/S1383-7621(96)00074-4_bib17","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/0196-6774(81)90010-9","article-title":"Finding the maximum merging and sorting in a parallel computation model","volume":"2","author":"Shiloach","year":"1981","journal-title":"J. Algorithms"},{"key":"10.1016\/S1383-7621(96)00074-4_bib18","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1109\/29.52700","article-title":"Frequency line tracking using hidden Markov models","volume":"38","author":"Streit","year":"1990","journal-title":"IEEE Trans. ASSP"},{"key":"10.1016\/S1383-7621(96)00074-4_bib19","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/0196-6774(83)90033-0","article-title":"Implementation of simultaneous memory address access in model that forbid it","volume":"4","author":"Vishkin","year":"1983","journal-title":"J. Algorithms"},{"key":"10.1016\/S1383-7621(96)00074-4_bib20","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1109\/9.57029","article-title":"On not losing track","volume":"35","author":"Washburn","year":"1990","journal-title":"IEEE Trans. AC"},{"key":"10.1016\/S1383-7621(96)00074-4_bib21","first-page":"287","article-title":"Finding the best set of K paths through a trellis with applications to multitarget tracking","volume":"25","author":"Wolf","year":"1989","journal-title":"IEEE Trans. AES"},{"key":"10.1016\/S1383-7621(96)00074-4_bib22","first-page":"637","article-title":"Practical graph partitioning algorithms for SONAR, Underwater Acoustic Data Processing","author":"Wu","year":"1989"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762196000744?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762196000744?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T05:57:58Z","timestamp":1555653478000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762196000744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,2]]},"references-count":22,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[1997,2]]}},"alternative-id":["S1383762196000744"],"URL":"https:\/\/doi.org\/10.1016\/s1383-7621(96)00074-4","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[1997,2]]}}}