{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:58Z","timestamp":1750220098072,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100019491","name":"National Natural Science Foundation of China - State Grid Corporation Joint Fund for Smart Grid","doi-asserted-by":"publisher","award":["61902421"],"award-info":[{"award-number":["61902421"]}],"id":[{"id":"10.13039\/501100019491","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,19]]},"DOI":"10.1145\/3487075.3487106","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:35:15Z","timestamp":1638909315000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DssEC: A Deep State Sequence Based Equivalence Checker"],"prefix":"10.1145","author":[{"given":"Jian","family":"Hu","sequence":"first","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]},{"given":"Yun","family":"Kang","sequence":"additional","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]},{"given":"Yongyang","family":"Hu","sequence":"additional","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]},{"given":"Haitao","family":"Yang","sequence":"additional","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]},{"given":"Le","family":"Tong","sequence":"additional","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]},{"given":"Jie","family":"Cheng","sequence":"additional","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]},{"given":"Junquan","family":"Deng","sequence":"additional","affiliation":[{"name":"The Sixty-third Research Institute, National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"High-Level Synthesis: Introduction to Chip and System Design","author":"Gajski D. D.","year":"1999","unstructured":"D. D. Gajski , N. D. Dutt , A. C , Wu and S. Y. Lin ( 1999 ). High-Level Synthesis: Introduction to Chip and System Design . Kluwer Academic Publishers . D. D. Gajski, N. D. Dutt, A. C, Wu and S. Y. Lin (1999). High-Level Synthesis: Introduction to Chip and System Design. Kluwer Academic Publishers."},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"566","article-title":"Translation Validation of High-Level Synthesis","volume":"29","author":"Kundu S.","year":"2010","unstructured":"S. Kundu , S. Lerner and R. K. Guptac ( 2010 ). Translation Validation of High-Level Synthesis , In TCAD , 29 ( 4 ), 566 - 579 . S. Kundu, S. Lerner and R. K. Guptac (2010). Translation Validation of High-Level Synthesis, In TCAD, 29(4), 566-579.","journal-title":"TCAD"},{"key":"e_1_3_2_1_3_1","first-page":"516","volume-title":"ISQED","author":"Li Tun","year":"2013","unstructured":"Tun Li , Yang Guo , Wanwei Liu , Chi yuan Ma ( 2013 ). Efficient Translation Validation of High-Level Synthesis , In ISQED , pp. 516 - 523 . Tun Li, Yang Guo, Wanwei Liu, Chi yuan Ma (2013). Efficient Translation Validation of High-Level Synthesis, In ISQED, pp.516-523."},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"85","article-title":"Path-based scheduling for synthesis","volume":"10","year":"1991","unstructured":"Camposano, R ( 1991 ). Path-based scheduling for synthesis . In TCAD. 10 ( 1 ): 85 - 93 . Camposano, R (1991). Path-based scheduling for synthesis. In TCAD. 10(1): 85-93.","journal-title":"TCAD."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483028.2483070"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"C.\n      Karfa D.\n      Sarkar C.\n      Mandal and \n      P.\n      Kumar\n   (\n  2008\n  ). \n  An equivalence-checking method for scheduling verification in high-level synthesis\n  . In \n  TCAD 27\n  :\n  556\n  -\n  569\n  .  C. Karfa D. Sarkar C. Mandal and P. Kumar (2008). An equivalence-checking method for scheduling verification in high-level synthesis. In TCAD 27:556-569.","DOI":"10.1109\/TCAD.2007.913390"},{"key":"e_1_3_2_1_7_1","first-page":"497","article-title":"Equivalence checking of scheduling with speculative code transformations in high-level synthesis","author":"Lee C.-H.","year":"2011","unstructured":"C.-H. Lee , C.-H. Shih , J.-D. Huang , and J.-Y. Jou ( 2011 ). Equivalence checking of scheduling with speculative code transformations in high-level synthesis . In ASP-DAC , 497 - 502 . C.-H. Lee, C.-H. Shih, J.-D. Huang, and J.-Y. Jou (2011). Equivalence checking of scheduling with speculative code transformations in high-level synthesis. In ASP-DAC, 497-502.","journal-title":"ASP-DAC"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960511"},{"volume-title":"June","year":"2021","key":"e_1_3_2_1_9_1","unstructured":"http:\/\/pypi.python.org\/pypi\/pycparser} (access time : June , 2021 ). http:\/\/pypi.python.org\/pypi\/pycparser} (access time: June, 2021)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"volume-title":"June","year":"2021","key":"e_1_3_2_1_11_1","unstructured":"http:\/\/z3.codeplex.com\/} (access time : June , 2021 ). http:\/\/z3.codeplex.com\/} (access time: June, 2021)."},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Formal verification of code motion techniques using data-flow-driven equivalence checking","volume":"30","author":"Karfa Chandan","year":"2012","unstructured":"Chandan Karfa , Chittaranjan A. Mandal , and Dipankar Sarkar ( 2012 ). Formal verification of code motion techniques using data-flow-driven equivalence checking . Transactions on Design Automation of Electronic Systems (TODAES):\u00a0 30 : 1 - 30 :37. Chandan Karfa, Chittaranjan A. Mandal, and Dipankar Sarkar (2012). Formal verification of code motion techniques using data-flow-driven equivalence checking. Transactions on Design Automation of Electronic Systems (TODAES):\u00a030:1-30:37.","journal-title":"Transactions on Design Automation of Electronic Systems (TODAES):\u00a0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2005.43"},{"issue":"8","key":"e_1_3_2_1_14_1","first-page":"1180","article-title":"Verification of code motion techniques using value propagation","volume":"33","author":"A.","year":"2014","unstructured":"Banerjee, K., Karfa, C., Sarkar, D., Mandal, C. A. ( 2014 ). Verification of code motion techniques using value propagation . In TCAD. 33 ( 8 ): 1180 - 1193 . Banerjee, K., Karfa, C., Sarkar, D., Mandal, C.A. (2014). Verification of code motion techniques using value propagation. In TCAD. 33(8): 1180-1193.","journal-title":"TCAD."},{"volume-title":"June","year":"2021","key":"e_1_3_2_1_15_1","unstructured":"http:\/\/cse.iitkgp.ac.in\/\\%7Echitta\/pubs} (access time : June , 2021 ). http:\/\/cse.iitkgp.ac.in\/\\%7Echitta\/pubs} (access time: June, 2021)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2003.1183177"},{"key":"e_1_3_2_1_17_1","volume-title":"Pattern Recognition and Machine Learning [M]","author":"Bishop","year":"2008","unstructured":"Bishop C ( 2008 ). Pattern Recognition and Machine Learning [M] . Berlin : Springer . Bishop C (2008). Pattern Recognition and Machine Learning [M]. Berlin: Springer."}],"event":{"name":"CSAE 2021: The 5th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2021","location":"Sanya China"},"container-title":["Proceedings of the 5th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487075.3487106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:10Z","timestamp":1750183810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":17,"alternative-id":["10.1145\/3487075.3487106","10.1145\/3487075"],"URL":"https:\/\/doi.org\/10.1145\/3487075.3487106","relation":{},"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}