{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:46:39Z","timestamp":1747975599881},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Signal Process."],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/tsp.2011.2106778","type":"journal-article","created":{"date-parts":[[2011,1,17]],"date-time":"2011-01-17T21:00:17Z","timestamp":1295298017000},"page":"2136-2145","source":"Crossref","is-referenced-by-count":13,"title":["Composite Cyclotomic Fourier Transforms With Reduced Complexities"],"prefix":"10.1109","volume":"59","author":[{"given":"Xuebin","family":"Wu","sequence":"first","affiliation":[]},{"given":"Meghanad","family":"Wagh","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026171930630"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946006020074"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2009891"},{"key":"ref13","first-page":"104","article-title":"Matrix-vector multiplication via erasure decoding","author":"trifonov","year":"2007","journal-title":"Proc XI Int Symp Probl Redundancy in Inf Control Syst"},{"key":"ref14","author":"aho","year":"1974","journal-title":"The Design and Analysis of Computer Algorithms Reading"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/el:19710492"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.1971.303141"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1974.1162532"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970364"},{"key":"ref28","author":"wu","year":"2010","journal-title":"Composite cyclotomic Fourier transforms with reduced complexities"},{"key":"ref4","year":"2007","journal-title":"Hard Disk Drive Long Data Sector White Paper"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056705"},{"key":"ref3","author":"wicker","year":"1995","journal-title":"Error Control Systems for Digital Communications and Storage"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEL.2004.1314939"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/49.1926"},{"key":"ref5","first-page":"1255","article-title":"Dual-mode decoding of product codes with application to tape storage","volume":"3","author":"han","year":"2005","journal-title":"Proc IEEE Global Telecommun Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1111\/j.2517-6161.1958.tb00300.x","article-title":"The interaction algorithm and practical Fourier analysis","volume":"20","author":"good","year":"1958","journal-title":"J Royal Statistical Society Series B (Methodological)"},{"key":"ref2","author":"blahut","year":"1984","journal-title":"Theory and Practice of Error Control Codes"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2004.10.001"},{"key":"ref1","author":"blahut","year":"1985","journal-title":"Fast Algorithms for Digital Signal Processing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.19"},{"key":"ref22","author":"garey","year":"1979","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"},{"key":"ref21","first-page":"62","article-title":"Fourier transform evaluation in fields of characteristic 2","volume":"28","author":"zakharova","year":"1992","journal-title":"Probl Peredachi Inf"},{"key":"ref24","first-page":"180","article-title":"A method for construction of composite length cyclic convolutions over finite fields","volume":"5","author":"churkov","year":"2004","journal-title":"Proc 32nd Conf Nedelya Nauki Sankt-Peterburgskogo Gosudarstvennogo Polytechnicheskogo universiteta (Scientific Week of Saint-Petersberg State Polytechnic Univ )"},{"key":"ref23","first-page":"33","author":"afanasyev","year":"1987","journal-title":"Pomekhoustoichivoe Kodirovanie i Nadezhnost' EVM (Error-Resistant Coding and Reliability of Computers)"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1109\/PROC.1968.6477","article-title":"discrete fourier transforms when the number of data samples is prime","volume":"56","author":"rader","year":"1968","journal-title":"Proceedings of the IEEE"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.73.4.1005"}],"container-title":["IEEE Transactions on Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/78\/5749296\/05688488.pdf?arnumber=5688488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:42Z","timestamp":1633909962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5688488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":29,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tsp.2011.2106778","relation":{},"ISSN":["1053-587X","1941-0476"],"issn-type":[{"value":"1053-587X","type":"print"},{"value":"1941-0476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]}}}