{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:12:17Z","timestamp":1759637537470},"reference-count":14,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5967,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Graph Theory"],"published-print":{"date-parts":[[1999,5]]},"DOI":"10.1002\/(sici)1097-0118(199905)31:1<1::aid-jgt1>3.0.co;2-i","type":"journal-article","created":{"date-parts":[[2004,11,14]],"date-time":"2004-11-14T18:46:32Z","timestamp":1100457992000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["The consecutive-4 digraphs are Hamiltonian"],"prefix":"10.1002","volume":"31","author":[{"given":"Gerard J.","family":"Chang","sequence":"first","affiliation":[]},{"given":"Frank K.","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Li-Da","family":"Tong","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0895-7177(97)00086-1","volume":"25","author":"Chang","year":"1997","journal-title":"Math Comp Mod"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB2","series-title":"Combinatorial","first-page":"65","volume-title":"De Bruijn digraphs, Kautz digraphs, and their generalizations","author":"Du","year":"1996","unstructured":"and ?De Bruijn digraphs, Kautz digraphs, and their generalizations,? Combinatorial network theory, and (Editors), Kluwer Academic, 1996, pp. 65-105."},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB3","doi-asserted-by":"crossref","first-page":"47","DOI":"10.4064\/-25-1-47-55","volume":"25","author":"Du","year":"1989","journal-title":"Banach Center Publ"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB4","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/0895-7177(93)90253-U","volume":"17","author":"Du","year":"1993","journal-title":"Math Comp Mod"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0095-8956(91)90084-W","volume":"52","author":"Du","year":"1991","journal-title":"J Comb Theory Ser B"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB6","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1137\/1004061","volume":"4","author":"Hull","year":"1962","journal-title":"SIAM Rev"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB7","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/0167-6377(87)90024-1","volume":"6","author":"Hwang","year":"1987","journal-title":"Op Res Lett"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB8","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1109\/TC.1981.1675809","volume":"C-30","author":"Imase","year":"1981","journal-title":"IEEE Trans Comp"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB9","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TC.1983.1676323","volume":"C-32","author":"Imase","year":"1983","journal-title":"IEEE Trans Comp"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB10","first-page":"15","volume-title":"The art of computer programming","volume":"2","author":"Knuth","year":"1966","unstructured":"The art of computer programming, Vol. 2, North Holland, Amsterdam, 1966, p. 15."},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB11","series-title":"Fault-toleran","doi-asserted-by":"crossref","DOI":"10.21236\/ADA183344","volume-title":"Fault-tolerant multiprocessor and VLSI based systems communication architecture","volume":"II","author":"Pradhan","year":"1986","unstructured":"?Fault-tolerant multiprocessor and VLSI based systems communication architecture,? Fault-tolerant computing, theory and techniques, Vol. II, (Editor), Prentice-Hall, Engleword Cliffs, NJ, 1986."},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB12","author":"Reddy","year":"1980","journal-title":"Sch Eng Oakland Univ Tech Rept"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB13","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1145\/321832.321838","volume":"21","author":"Wong","year":"1974","journal-title":"J Assoc Comp Mach"},{"key":"10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I-BIB14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1002\/jgt.3190100103","volume":"10","author":"van Doorn","year":"1986","journal-title":"J Graph Theory"}],"container-title":["Journal of Graph Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1097-0118(199905)31:1%3C1::AID-JGT1%3E3.0.CO;2-I","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1097-0118(199905)31:1%3C1::AID-JGT1%3E3.0.CO;2-I","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T09:51:29Z","timestamp":1625133089000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1097-0118(199905)31:1<1::AID-JGT1>3.0.CO;2-I"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1999,5]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1097-0118(199905)31:1<1::aid-jgt1>3.0.co;2-i","relation":{},"ISSN":["0364-9024","1097-0118"],"issn-type":[{"value":"0364-9024","type":"print"},{"value":"1097-0118","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,5]]}}}