{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:34:37Z","timestamp":1729614877421,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/cis.2013.73","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T15:24:01Z","timestamp":1394205841000},"page":"313-317","source":"Crossref","is-referenced-by-count":2,"title":["Differential Edge-Triggered Flip-Flops Using Neuron-MOS Transistors"],"prefix":"10.1109","author":[{"given":"Guoqiang","family":"Hang","sequence":"first","affiliation":[]},{"given":"Xiaohui","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"You","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ISCAS.2008.4542177"},{"key":"16","first-page":"1316","article-title":"A design technique of neuron mos binary circuits based on multiple-valued logic","volume":"27","author":"hang","year":"2006","journal-title":"Chinese J of Semiconductors"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/16.137325"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/TCSII.2001.913180"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ISCAS.2004.1329408"},{"key":"12","first-page":"241","article-title":"Novel high speed differential cmos flip-flop for ultra low-voltage applications","author":"berg","year":"2011","journal-title":"Proc of NEWCAS"},{"key":"3","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1049\/el:20000752","article-title":"differential cmos edge-triggered flip-flop based on clock racing","volume":"36","author":"moisiadis","year":"2000","journal-title":"Electronics Letters"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/4.845191"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/MWSCAS.2006.382032"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/4.553179"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/s00202-006-0018-2"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1049\/el:20010530"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1049\/el:20020038"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/ISCAS.2001.922359"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1049\/el.2012.3016"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TVLSI.2011.2158613"}],"event":{"name":"2013 Ninth International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2013,12,14]]},"location":"Emeishan 614201, China","end":{"date-parts":[[2013,12,15]]}},"container-title":["2013 Ninth International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6733782\/6746335\/06746409.pdf?arnumber=6746409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:13:46Z","timestamp":1498108426000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6746409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cis.2013.73","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}