{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:54:34Z","timestamp":1759146874069},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[1980,3,1]],"date-time":"1980-03-01T00:00:00Z","timestamp":320716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[1980,3]]},"DOI":"10.1109\/mc.1980.1653527","type":"journal-article","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T16:04:20Z","timestamp":1187798660000},"page":"27-37","source":"Crossref","is-referenced-by-count":101,"title":["Error-Correcting Codes and Self-Checking Circuits"],"prefix":"10.1109","volume":"13","author":[{"family":"Pradhan","sequence":"first","affiliation":[]},{"family":"Stiffler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/T-C.1975.224187","article-title":"detection of unidirectional multiple errors using low-cost arithmetic codes","volume":"c 24","author":"wakerly","year":"1975","journal-title":"IEEE Transactions on Computers"},{"key":"ref39","article-title":"information theoretical methods in the theory of reliability for discrete automata","author":"sagalovich","year":"1975","journal-title":"Proc 1975 IEEE-USSR Joint Workshop on Information Theory"},{"key":"ref38","author":"sagalovich","year":"1975","journal-title":"States Coding and Automata Reliability"},{"key":"ref33","year":"0","journal-title":"Problems of Information Transmission"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675143"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675126"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224254"},{"key":"ref37","author":"sagalovich","year":"1960","journal-title":"Problems of Information Transmission"},{"key":"ref36","article-title":"linear codes for automata","author":"nikanorov","year":"1972","journal-title":"Int'l Symp Design and Maintenance of Logical Systems"},{"key":"ref35","author":"nikaronov","year":"1974","journal-title":"Problems of Information Transmission"},{"key":"ref34","author":"nemsadze","year":"1969","journal-title":"Problems of Information Transmission"},{"key":"ref60","author":"smith","year":"1976","journal-title":"The design of totally self-checking combinational circuits"},{"key":"ref62","first-page":"173","article-title":"the design of totally self-checking circuits using programmable logic arrays","author":"wang","year":"1979","journal-title":"Digest of Papers 20th Int l Symp Fault-Tolerant Computing"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675139"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(61)80037-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1973.5217545"},{"key":"ref64","author":"bose","year":"0","journal-title":"Theory and design of unidirectional error codes"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1147\/rd.144.0384"},{"key":"ref65","author":"frieman","year":"1961","journal-title":"Protective block codes for asymmetric binary channels"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675102"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1147\/rd.144.0395"},{"key":"ref67","first-page":"361","article-title":"fault-tolerant fail- safe logic networks","author":"pradhan","year":"0","journal-title":"Proc COMPCOM Spring 77"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1980.1675606"},{"key":"ref69","first-page":"213","article-title":"reliability of integrated circuits","author":"sahani","year":"1970","journal-title":"Proc IEEE Int'l Computer Group Conf"},{"key":"ref2","author":"berelkamp","year":"1968","journal-title":"Algebraic Coding Theory"},{"key":"ref1","first-page":"329","article-title":"effect on detection of intermittent failure in digital systems","volume":"35","author":"ball","year":"1969","journal-title":"AFIPS Conf Proc"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1147\/rd.32.0163"},{"key":"ref22","author":"winograd","year":"1963","journal-title":"Reliable Computation in the Presence of Noise"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1972.223504"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1147\/rd.144.0402"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675394"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.1674655"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675072"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/T-C.1971.223148","article-title":"a simple self-testing decoder checking circuit","volume":"c 20","author":"carter","year":"1971","journal-title":"IEEE Transactions on Computers"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1973.223704"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.1674668"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532642"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675118"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675138"},{"key":"ref55","first-page":"179","article-title":"design of self- checking checkers for berger codes","author":"marouf","year":"1978","journal-title":"Digest of Papers?Eighth Ann Int'l Conf Fault-Tolerant Computing"},{"key":"ref54","first-page":"137","article-title":"design of self-checking microprogrammed controls","author":"diaz","year":"1975","journal-title":"Digest of Papers 20th Int l Symp Fault-Tolerant Computing"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675338"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675149"},{"key":"ref10","first-page":"487","article-title":"checking codes for digital computers","author":"diamond","year":"1955","journal-title":"Proc IRE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1147\/rd.145.0563"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674762"},{"key":"ref12","first-page":"273","volume":"4","author":"massey","year":"1971","journal-title":"Advances in Information System Sciences"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.223857"},{"key":"ref14","first-page":"4.22","article-title":"synthesis of fault-tolerant arithmetic and logic processors by using nonbinary codes","author":"pradhan","year":"1974","journal-title":"Digest of Papers 20th Int l Symp Fault-Tolerant Computing"},{"key":"ref15","author":"rao","year":"1974","journal-title":"Error Coding forArithmetic Processors"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(59)90247-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/rd.24.0346"},{"key":"ref18","first-page":"89","article-title":"on the methods of checking logical operations","author":"garcia","year":"1968","journal-title":"Proc 2nd Ann Princeton Conf Information Science and Systems"},{"key":"ref19","article-title":"a residue checker for arithmetic and logical operations","author":"monterio","year":"1972","journal-title":"Digest of Papers Fault-Tolerant Computing Symp -20"},{"key":"ref4","first-page":"134","article-title":"architectural design for near-100% fault coverage","author":"stiffler","year":"1976","journal-title":"Proc 1976 Int'l Symp Fault-Tolerant Computing"},{"key":"ref3","author":"peterson","year":"1971","journal-title":"Error-Correcting Codes"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1499402.1499549"},{"key":"ref5","author":"tanenbaum","year":"1976","journal-title":"Structured Computer Organization"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1322","DOI":"10.1109\/T-C.1971.223134","article-title":"arithmetic error codes: cost and effectiveness studies for application in digital system design","volume":"c 20","author":"avizienis","year":"1971","journal-title":"IEEE Transactions on Computers"},{"key":"ref7","author":"wakerly","year":"1978","journal-title":"Error Detecting Codes Self-Checking Circuits and Applications"},{"key":"ref49","first-page":"878","article-title":"design of dynamically checked computers","volume":"2","author":"carter","year":"0","journal-title":"Proc IFIP Congress 68"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(71)90125-2"},{"key":"ref46","author":"anderson","year":"1971","journal-title":"Design of self-checking digital networks"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1970.222829"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674911"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1973.223705"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5008917"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223101"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675168"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.224013"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/2\/34655\/01653527.pdf?arnumber=1653527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:56:55Z","timestamp":1641988615000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1653527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1980,3]]},"references-count":70,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mc.1980.1653527","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[1980,3]]}}}