{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:46:06Z","timestamp":1757310366886,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icinfa.2015.7279596","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T21:51:38Z","timestamp":1443736298000},"page":"1887-1892","source":"Crossref","is-referenced-by-count":7,"title":["A new algebraic approach to finding all simple paths and cycles in undirected graphs"],"prefix":"10.1109","author":[{"given":"Runtao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Rui","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Chengjin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1978.1084515"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0210062"},{"key":"ref12","article-title":"A New Way to Enumerate Cycles in Graph","author":"liu","year":"2006","journal-title":"Advanced Industrial Conference on Telecommunications"},{"key":"ref13","first-page":"193","article-title":"An Algorithm for Detecting Cycles in Undirected Graphs using CUDA Technology","volume":"2","author":"safar","year":"2012","journal-title":"International Journal on New Computer Architectures and their Applications"},{"key":"ref14","article-title":"Optimal Listing of Cycles and st-Paths in Undirected Graphs","author":"birmele","year":"2012","journal-title":"Proc ACM\/SIAM Symposium on Discrete Algorithms"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2006.13.133"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm160"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-007-9008-7"},{"journal-title":"Semi-tensor Product of Matrices-Theory and Applications","year":"2007","author":"cheng","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.03.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2229156.2229160"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-097-7","author":"cheng","year":"2011","journal-title":"Analysis and Control of Boolean Networks A Semi-Tensor Product Approach"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-10-181"},{"key":"ref6","article-title":"Network Reliability and Fault Tolerance","author":"medard","year":"2002","journal-title":"MIT Laboratory for Information and Decision Systems Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/38\/21\/005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCT.1968.1082837"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/0114051"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1534710100"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/0204007"},{"journal-title":"Graphs Theory and Applications with Exercises and Problems","year":"2013","author":"fournier","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.automatica.2009.10.036","article-title":"Realization of Boolean Control Networks","volume":"46","author":"cheng","year":"2010","journal-title":"Automatica"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.1581"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2050161"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4310\/MAA.2003.v10.n4.a5"},{"key":"ref23","first-page":"1045","article-title":"Some Applications of Semi-tensor Product of Matrices in Algebra","volume":"52","author":"cheng","year":"2006","journal-title":"Some Applications of Semi-tensor Product of Matrices in Algebra"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.03.024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-007-9027-0"}],"event":{"name":"2015 IEEE International Conference on Information and Automation (ICIA)","start":{"date-parts":[[2015,8,8]]},"location":"Lijiang","end":{"date-parts":[[2015,8,10]]}},"container-title":["2015 IEEE International Conference on Information and Automation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7267673\/7279248\/07279596.pdf?arnumber=7279596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,2]],"date-time":"2020-02-02T15:37:46Z","timestamp":1580657866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7279596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2015.7279596","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}