{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:46:27Z","timestamp":1770547587283,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/tr.2009.2034946","type":"journal-article","created":{"date-parts":[[2009,12,11]],"date-time":"2009-12-11T17:58:37Z","timestamp":1260554317000},"page":"145-161","source":"Crossref","is-referenced-by-count":91,"title":["Decision Diagram Based Methods and Complexity Analysis for Multi-State Systems"],"prefix":"10.1109","volume":"59","author":[{"given":"A.","family":"Shrestha","sequence":"first","affiliation":[]},{"family":"Liudong Xing","sequence":"additional","affiliation":[]},{"family":"Yuanshun Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"43","article-title":"quantifying application communication reliability of wireless sensor networks","volume":"4","author":"shrestha","year":"2008","journal-title":"International Journal of Performability Engineering"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.853444"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/12.144618"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2007.13"},{"key":"ref31","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2006038"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICRMS.2009.5270231"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2009.4914667"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL.1998.679287"},{"key":"ref34","author":"yang","year":"1991","journal-title":"Logic Synthesis and Optimization Benchmarks User Guide Version 3 0"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1142\/5221","author":"lisnianski","year":"2003","journal-title":"Multi-State System Reliability"},{"key":"ref40","first-page":"419","article-title":"fault-tolerance and reliability analysis for wireless sensor networks","volume":"5","author":"xing","year":"2009","journal-title":"International Journal of Performability Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1252856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1986.4335402"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0161-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00124-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.05.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/07408170500341270"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(00)00039-3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2003.08.007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00110-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/3212967"},{"key":"ref4","first-page":"188","article-title":"multi-terminal binary decision diagrams to represent and analyse continuous-time markov chains","author":"hermanns","year":"1999","journal-title":"Proc the 2nd Int Workshop on Numerical Solution of Markov Chains"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/3213425"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1995.480018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(93)90060-C"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.1997.571665"},{"key":"ref5","first-page":"6","author":"miner","year":"1999","journal-title":"Applications and Theory of Petri Nets"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70244"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.833311"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"ref9","year":"2008","journal-title":"Handbook of Performability Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675141"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.08.023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/24.722283"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2006.58"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2003.12.002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-006-0016-z"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00171-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0029-5493(80)90102-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.09.013"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/24\/5423274\/05352282.pdf?arnumber=5352282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T01:00:05Z","timestamp":1633914005000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5352282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2009.2034946","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3]]}}}