{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T11:44:31Z","timestamp":1762775071333,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","funder":[{"name":"Fonds Wetenschappelijk Onderzoek - Vlaanderen FWO)","award":["G0F5921N"],"award-info":[{"award-number":["G0F5921N"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,28]]},"DOI":"10.1145\/3747199.3747573","type":"proceedings-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T10:51:17Z","timestamp":1762771877000},"page":"293-301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Redundancy analysis using lcm-filtrations: networks, system signature and sensitivity evaluation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5187-0995","authenticated-orcid":false,"given":"Fatemeh","family":"Mohammadi","sequence":"first","affiliation":[{"name":"Department of computer Science and Department of Mathematics, KU Leuven, Leuven, Flemish Brabant, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5615-4194","authenticated-orcid":false,"given":"Eduardo","family":"S\u00e1enz-de-Cabez\u00f3n","sequence":"additional","affiliation":[{"name":"Mathematics, Universidad de La Rioja, Logro\u00f1o, La Rioja, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6448-1080","authenticated-orcid":false,"given":"Henry","family":"Wynn","sequence":"additional","affiliation":[{"name":"Department of Statistics, London Schools of Economics, London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Kouichi Adachi Masanori Kodama and Mamoru Ohashi. 1979. k-out-of-n: G system with simultaneous failure and three repair policies. Microelectronics Reliability 19 4 (1979) 351\u2013361. 10.1016\/0026-2714(79)90153-7","DOI":"10.1016\/0026-2714(79)90153-7"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Guillermo Alesandroni. 2017. Minimal resolutions of dominant and semidominant ideals. Journal of Pure and Applied Algebra 221 4 (2017) 780\u2013798. 10.1016\/j.jpaa.2016.08.003","DOI":"10.1016\/j.jpaa.2016.08.003"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Philip\u00a0J Boland. 2001. Signatures of indirect majority systems. Journal of applied probability 38 2 (2001) 597\u2013603.","DOI":"10.1239\/jap\/996986765"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"G. Carlsson and A. Zomorodian. 2005. Computing persistent homology. Discrete and Computational Geometry 33(2) (2005) 249\u2013274.","DOI":"10.1007\/s00454-004-1146-y"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Ri-Xiang Chen. 2022. Lcm-lattice Taylor bases and minimal free resolutions of a monomial ideal. Journal of Algebra and Its Applications 21 11 (2022) 2250216.","DOI":"10.1142\/S0219498822502164"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Timothy\u00a0B.P. Clark. 2010. Poset resolutions and lattice-linear monomial ideals. Journal of Algebra 323 4 (2010) 899\u2013919.","DOI":"10.1016\/j.jalgebra.2009.11.029"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"D. Cohen-Steiner H. Edelsbrunner and J. Harer. 2007. Stability of persistence diagrams. Discrete and Computational Geometry 37(1) (2007) 1103\u2013120.","DOI":"10.1007\/s00454-006-1276-5"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Jes\u00fas\u00a0A. De\u00a0Loera Sonja Petrovi\u0107 Lily Silverstein Despina Stasi and Dane Wilburne. 2019. Random monomial ideals. Journal of Algebra 519 (2019) 440\u2013473.","DOI":"10.1016\/j.jalgebra.2018.05.041"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597066.3597095"},{"key":"e_1_3_3_1_11_2","volume-title":"Computational topology: an introduction","author":"Edelsbrunner H.","year":"2010","unstructured":"H. Edelsbrunner and J. Harer. 2010. Computational topology: an introduction. American Mathematical Society."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Paul Erd\u0151s and Alfr\u00e9d R\u00e9nyi. 1959. On Random Graphs. I. Publicationes Mathematicae 6 3-4 (1959) 290\u2013297.","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"V. Gasharov I. Peeva and V. Welker. 1999. The lcm-lattice in monomial resolutions. Mathematical Research Letters 6 (1999) 521\u2013532.","DOI":"10.4310\/MRL.1999.v6.n5.a5"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Amir\u00a0Kafshdar Goharshady and Fatemeh Mohammadi. 2020. An efficient algorithm for computing network reliability in small treewidth. Reliability Engineering & System Safety 193 (2020) 106665.","DOI":"10.1016\/j.ress.2019.106665"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-106-6"},{"key":"e_1_3_3_1_16_2","unstructured":"Melvin Hochster. 1977. Cohen-Macaulay rings combinatorics and simplicial complexes in Ring Theory II. Lect. Notes in Pure Appl. Math.26 (1977) 171\u2013223."},{"key":"e_1_3_3_1_17_2","volume-title":"Optimal reliability modelling","author":"Kuo Way","year":"2002","unstructured":"Way Kuo and Ming Zuo. 2002. Optimal reliability modelling. John Wiley and sons."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Qun Liu Zhishan Dong and En Wang. 2018. Cut based method for comparing complex networks. Scientific reports 8 1 (2018) 5134.","DOI":"10.1038\/s41598-018-21532-5"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"S. Mapes. 2013. Finite atomic lattices and resolutions of monomial ideals. Journal of Algebra 379 (2013) 259\u2013276.","DOI":"10.1016\/j.jalgebra.2013.01.005"},{"key":"e_1_3_3_1_20_2","volume-title":"Combinatorial commutative algebra","author":"Miller E.","year":"2005","unstructured":"E. Miller and B. Sturmfels. 2005. Combinatorial commutative algebra. Springer."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Mohammadi. 2016. Divisors on graphs orientations syzygies and system reliability. Journal of Algebraic Combinatorics 43 (2016) 465\u2013483.","DOI":"10.1007\/s10801-015-0641-y"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Mohammadi Patricia Pascual-Ortigosa Eduardo S\u00e1enz-de Cabez\u00f3n and Henry\u00a0P Wynn. 2020. Polarization and depolarization of monomial ideals with application to multi-state system reliability. Journal of Algebraic Combinatorics 51 4 (2020) 617\u2013639.","DOI":"10.1007\/s10801-019-00887-6"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Fatemeh Mohammadi Eduardo S\u00e1enz-de Cabez\u00f3n and Henry\u00a0P. Wynn. 2016. The Algebraic Method in Tree Percolation. SIAM Journal on Discrete Mathematics 30 2 (2016) 1193\u20131212. 10.1137\/151003647","DOI":"10.1137\/151003647"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"F. Mohammadi E. S\u00e1enz-de-Cabez\u00f3n and H.\u00a0P. Wynn. 2017. Types of signature analysis in reliability based on Hilbert series. Journal of Symbolic Computation 79(1) (2017) 140\u2013155.","DOI":"10.1016\/j.jsc.2016.08.010"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Mohammadi and Farbod Shokrieh. 2014. Divisors on graphs connected flags and syzygies. International Mathematics Research Notices 2014 24 (2014) 6839\u20136905.","DOI":"10.1093\/imrn\/rnt186"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Mohammadi and Farbod Shokrieh. 2016. Divisors on graphs binomial and monomial ideals and cellular resolutions. Mathematische Zeitschrift 283 1 (2016) 59\u2013102.","DOI":"10.1007\/s00209-015-1589-2"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"F. Mohammadi E. S\u00e1enz-de-Cabez\u00f3n and H.\u00a0P. Wynn. 2018. Efficient multicut enumeration of k-out-of-n:F and consecutive k-out-of-n:F systems. Pattern Recognition Letters 102 (2018) 82 \u2013 88.","DOI":"10.1016\/j.patrec.2017.12.021"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"e_1_3_3_1_29_2","unstructured":"J. Phan. 2006. Order properties of monomial ideals and their free resolutions. Ph.\u00a0D. Dissertation. Columbia University."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Alexander Postnikov and Boris Shapiro. 2004. Trees parking functions syzygies and deformations of monomial ideals. Transactions of the American mathematical society 356 8 (2004) 3109\u20133142.","DOI":"10.1090\/S0002-9947-04-03547-0"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2494-631"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"E. S\u00e1enz-de-Cabez\u00f3n and H.\u00a0P. Wynn. 2009. Betti numbers and minimal free resolutions for multi-state system reliability bounds. Journal of Symbolic Computation 44 (2009) 1311\u20131325.","DOI":"10.1016\/j.jsc.2008.06.002"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"E. S\u00e1enz-de-Cabez\u00f3n and H.\u00a0P. Wynn. 2015. Hilbert functions for design in reliability. IEEE Trans. Rel. 64 (2015) 83\u201393.","DOI":"10.1109\/TR.2014.2354173"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71797-5"},{"key":"e_1_3_3_1_35_2","unstructured":"Diana\u00a0K. Taylor. 1966. Ideals generated by monomials in an R-sequence. PhD thesis. University of Chicago."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987614"}],"event":{"name":"ISSAC '25: International Symposium on Symbolic and Algebraic Computation","sponsor":["SIGSAM ACM Special Interest Group on Symbolic and Algebraic Manipulation"],"location":"Guanajuato Mexico","acronym":"ISSAC '25"},"container-title":["Proceedings of the 2025 International Symposium on Symbolic and Algebraic Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3747199.3747573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T11:40:16Z","timestamp":1762774816000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3747199.3747573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,28]]},"references-count":35,"alternative-id":["10.1145\/3747199.3747573","10.1145\/3747199"],"URL":"https:\/\/doi.org\/10.1145\/3747199.3747573","relation":{},"subject":[],"published":{"date-parts":[[2025,7,28]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}