{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:54:01Z","timestamp":1725389641899},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/icca.2011.6138075","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T16:49:16Z","timestamp":1328028556000},"page":"1337-1342","source":"Crossref","is-referenced-by-count":0,"title":["MicroRNA target validation by formal methods"],"prefix":"10.1109","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Hai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1038\/sj.onc.1210293"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/S0065-230X(01)82002-9"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1093\/bioinformatics\/btl596"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.molcel.2007.05.017"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1093\/bioinformatics\/btq050"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1093\/bioinformatics\/btn275"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/5.24143"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/S0092-8674(03)01018-3"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1186\/1471-2105-10-295"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1016\/j.ydbio.2006.08.028"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.molcel.2007.05.010"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1093\/nar\/gkn851"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1126\/science.282.5387.290"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1093\/bioinformatics\/bti1048"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/0092-8674(93)90529-Y"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1080\/01926230701320337"},{"year":"1999","author":"clarke","journal-title":"Model checking","key":"6"},{"key":"5","first-page":"241","article-title":"Nusmv 2: An opensource tool for symbolic model checking","author":"cimatti","year":"2002","journal-title":"Computer Aided Verification"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1093\/bib\/bbm029"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1038\/ng1536"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1038\/cdd.2009.56"}],"event":{"name":"2011 9th IEEE International Conference on Control and Automation (ICCA)","start":{"date-parts":[[2011,12,19]]},"location":"Santiago, Chile","end":{"date-parts":[[2011,12,21]]}},"container-title":["2011 9th IEEE International Conference on Control and Automation (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6126159\/6137867\/06138075.pdf?arnumber=6138075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:07:00Z","timestamp":1490090820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6138075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icca.2011.6138075","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}