{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:47:37Z","timestamp":1740181657120,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["2525\/19"],"award-info":[{"award-number":["2525\/19"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/jsait.2023.3300831","type":"journal-article","created":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:32:07Z","timestamp":1690914727000},"page":"314-330","source":"Crossref","is-referenced-by-count":2,"title":["Genomic Compression With Read Alignment at the Decoder"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5612-0659","authenticated-orcid":false,"given":"Yotam","family":"Gershon","sequence":"first","affiliation":[{"name":"Viterbi Department of Electrical and Computer Engineering, Technion&#x2019;Israel Institute of Technology, Haifa, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6369-6699","authenticated-orcid":false,"given":"Yuval","family":"Cassuto","sequence":"additional","affiliation":[{"name":"Viterbi Department of Electrical and Computer Engineering, Technion&#x2019;Israel Institute of Technology, Haifa, Israel"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3023945"},{"journal-title":"Sequencing coverage in next generation sequencing","year":"2021","author":"illumina","key":"ref35"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424816"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-02480-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2991\/mmebc-16.2016.363"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2008.0014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4137\/CIN.S13879"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808968"},{"key":"ref31","article-title":"The mathematical analysis of logic","author":"boole","year":"1847","journal-title":"Philosophical Library"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875417"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2002.999963"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btu844"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.815784"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518191"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/bib\/bbt087","article-title":"High-throughput DNA sequence data compression","volume":"16","author":"zhu","year":"2013","journal-title":"Briefings Bioinformat"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2270273"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/npg.els.0005005"},{"journal-title":"Random Walks and Catalan Factorization","year":"1999","author":"e?ecio?lu","key":"ref39"},{"journal-title":"Channel Coding for Telecommunications","year":"1999","author":"bossert","key":"ref16"},{"journal-title":"Statistics libertexts the simple random walk","year":"2020","author":"siegrist","key":"ref38"},{"journal-title":"Error Control Coding 2nd Edition","year":"2004","author":"lin","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg1067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btu856"},{"key":"ref23","first-page":"845","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"63","author":"levenshtein","year":"1966","journal-title":"Soviet Phys Doklady"},{"key":"ref26","article-title":"The identity of indiscernibles","author":"forrest","year":"2008","journal-title":"The Stanford Encyclopedia of Philosophy"},{"key":"ref25","article-title":"Point sets","author":"?ech","year":"1969","journal-title":"Academia Publishing House of the Czechoslovak Academy of Sciences"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/18.737536"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1109\/26.795817","article-title":"On decoding of both errors and erasures of a Reed-Solomon code using an inverse-free berlekamp-massey algorithm","volume":"47","author":"jeng","year":"1999","journal-title":"IEEE Trans Inf Theory"},{"journal-title":"Algebraic Coding Theory Revised 1984 Edition","year":"1984","author":"berlekamp","key":"ref21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1055991"},{"key":"ref27","first-page":"96","article-title":"DNA sequence modeling based on context trees","author":"kusters","year":"2015","journal-title":"Proc 36th WIC Symp Inf Theory"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/26.494301"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.959290"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.813496"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/info7040056"},{"key":"ref3","first-page":"72","article-title":"DNA lossless compression algorithms: Review","volume":"3","author":"bakr","year":"2013","journal-title":"America Journal of Bioinformatics Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055171"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8700143\/10153947\/10198542.pdf?arnumber=10198542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:15:53Z","timestamp":1707869753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10198542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/jsait.2023.3300831","relation":{},"ISSN":["2641-8770"],"issn-type":[{"type":"electronic","value":"2641-8770"}],"subject":[],"published":{"date-parts":[[2023]]}}}