{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T15:13:34Z","timestamp":1700406814740},"reference-count":10,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":6087,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Networks"],"published-print":{"date-parts":[[1999,1]]},"DOI":"10.1002\/(sici)1097-0037(199901)33:1<43::aid-net3>3.0.co;2-6","type":"journal-article","created":{"date-parts":[[2004,11,14]],"date-time":"2004-11-14T19:38:00Z","timestamp":1100461080000},"page":"43-56","source":"Crossref","is-referenced-by-count":7,"title":["Balanced network flows. III. Strongly polynomial augmentation algorithms"],"prefix":"10.1002","volume":"33","author":[{"given":"Christian","family":"Fremuth-Paeger","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Jungnickel","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB1","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/0196-6774(85)90022-7","volume":"6","author":"Anstee","year":"1985","journal-title":"J Algor"},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB2","doi-asserted-by":"crossref","first-page":"449","DOI":"10.4153\/CJM-1965-045-4","volume":"17","author":"Edmonds","year":"1965","journal-title":"Can J Math"},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB3","volume-title":"Degree Constrained Subgraph Problems and Network Flow Optimization","author":"Fremuth-Paeger","year":"1997","unstructured":"Degree Constrained Subgraph Problems and Network Flow Optimization, Wissner Verlag, Augsburg, 1997."},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB4","author":"Fremuth-Paeger","journal-title":"Networks"},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB5","author":"Fremuth-Paeger","journal-title":"Networks"},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB6","author":"Fremuth-Paeger","unstructured":"and Balanced network flows (IV): Duality and structure theory, Networks, submitted."},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB7","author":"Micali","year":"1980","unstructured":"and An O(?V E) algorithm for finding maximum matching in general graphs, Proceedings of the 21st Annual IEEE Symposium in Foundation of Computer Science, 1980, pp. 17-27."},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB8","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/BF01762129","volume":"3","author":"Peterson","year":"1988","journal-title":"Algorithmica"},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB9","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970265","volume-title":"Data Structure and Network Algorithms","author":"Tarjan","year":"1983","unstructured":"Data Structure and Network Algorithms, SIAM, Philadelphia, PA 1983."},{"key":"10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6-BIB10","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/BF01305952","volume":"14","author":"Vazirani","year":"1994","journal-title":"Combinatorica"}],"container-title":["Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1097-0037(199901)33:1%3C43::AID-NET3%3E3.0.CO;2-6","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1097-0037(199901)33:1%3C43::AID-NET3%3E3.0.CO;2-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T09:29:10Z","timestamp":1625131750000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1097-0037(199901)33:1<43::AID-NET3>3.0.CO;2-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,1]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1999,1]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1097-0037(199901)33:1<43::aid-net3>3.0.co;2-6","relation":{},"ISSN":["0028-3045","1097-0037"],"issn-type":[{"value":"0028-3045","type":"print"},{"value":"1097-0037","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,1]]}}}