{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:46:00Z","timestamp":1729622760491,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/prdc.2004.1276573","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"227-236","source":"Crossref","is-referenced-by-count":0,"title":["Protecting wavelet lifting transforms"],"prefix":"10.1109","author":[{"given":"G.R.","family":"Redinbo","sequence":"first","affiliation":[]},{"family":"Cung Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Topics in Algebra Second Edition","year":"1975","author":"herstein","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/12.689644"},{"journal-title":"Design and Analysis of Fault-Tolerant Digital Systems","year":"1989","author":"johnson","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/12.293265"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941389"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1993.627362"},{"key":"14","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1109\/12.464396","article-title":"An efficient algorithm-based concurrent error detection for FFT networks","volume":"44","author":"oh","year":"1995","journal-title":"IEEE Transactions on Computers"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/71.207595"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/4.133159"},{"journal-title":"Introduction to Wavelets and Wavelet Transforms A Primer","year":"1998","author":"burrus","key":"3"},{"journal-title":"Matrix Theory with Applications","year":"1991","author":"goldberg","key":"20"},{"journal-title":"ISO\/IEC 15444-1 International Standard Information Technology - JPEG2000 - Image Coding System","year":"2000","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0799-4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1990.89346"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476026"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/12.544481"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/4.391126"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028901"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/12.4606"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56702-5"}],"event":{"name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.","location":"Papeete, Tahiti, French Polynesia"},"container-title":["10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8995\/28541\/01276573.pdf?arnumber=1276573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:56:22Z","timestamp":1497599782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/prdc.2004.1276573","relation":{},"subject":[]}}