{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:58:57Z","timestamp":1725537537109},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042430"},{"type":"electronic","value":"9783642042447"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04244-7_7","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:17:24Z","timestamp":1252952244000},"page":"50-64","source":"Crossref","is-referenced-by-count":7,"title":["Modelling Equidistant Frequency Permutation Arrays: An Application of Constraints to Mathematics"],"prefix":"10.1007","author":[{"given":"Sophie","family":"Huczynska","sequence":"first","affiliation":[]},{"given":"Paul","family":"McKay","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Miguel","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Nightingale","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1002\/jcd.20096","volume":"14","author":"S. Huczynska","year":"2006","unstructured":"Huczynska, S., Mullen, G.: Frequency permutation arrays. J. Combin. Des.\u00a014, 463\u2013478 (2006)","journal-title":"J. Combin. Des."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1023\/B:DESI.0000029212.52214.71","volume":"32","author":"W. Chu","year":"2004","unstructured":"Chu, W., Colbourn, C., Dukes, P.: Constructions for permutation codes in powerline communications. Designs, Codes and Cryptography\u00a032, 51\u201364 (2004)","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1016\/j.dam.2005.09.009","volume":"154","author":"W. Chu","year":"2006","unstructured":"Chu, W., Colbourn, C., Dukes, P.: On constant composition codes. Discrete Applied Math.\u00a0154, 912\u2013929 (2006)","journal-title":"Discrete Applied Math."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Huczynska, S.: Equidistant frequency permutation arrays and related constant composition codes. Designs, Codes and Cryptography (to appear, 2009)","DOI":"10.1007\/s10623-009-9312-0"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10623-006-0004-8","volume":"40","author":"C. Ding","year":"2006","unstructured":"Ding, C., Yin, J.: A construction of optimal constant composition codes. Designs, Codes and Cryptography\u00a040, 157\u2013165 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/0898-1221(94)00219-B","volume":"29","author":"J. Slaney","year":"1995","unstructured":"Slaney, J., Fujita, M., Stickel, M.: Automated reasoning and exhaustive search: Quasigroup existence problems. Computers and Mathematics with Applications\u00a029, 115\u2013132 (1995)","journal-title":"Computers and Mathematics with Applications"},{"key":"7_CR7","unstructured":"Gent, I.P., Jefferson, C., Miguel, I.: Minion: A fast, scalable, constraint solver. In: Proceedings 17th European Conference on Artificial Intelligence (ECAI 2006), pp. 98\u2013102 (2006)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/11889205_15","volume-title":"Principles and Practice of Constraint Programming - CP 2006","author":"I.P. Gent","year":"2006","unstructured":"Gent, I.P., Jefferson, C., Miguel, I.: Watched literals for constraint propagation in minion. In: Benhamou, F. (ed.) CP 2006. LNCS, vol.\u00a04204, pp. 182\u2013197. Springer, Heidelberg (2006)"},{"key":"7_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-73580-9_16","volume-title":"Abstraction, Reformulation, and Approximation","author":"I.P. Gent","year":"2007","unstructured":"Gent, I.P., Miguel, I., Rendl, A.: Tailoring solver-independent constraint models: A case study with Essence\u2032 and Minion. In: Miguel, I., Ruml, W. (eds.) SARA 2007. LNCS (LNAI), vol.\u00a04612, pp. 184\u2013199. Springer, Heidelberg (2007)"},{"key":"7_CR10","unstructured":"R\u00e9gin, J.C.: Generalized arc consistency for global cardinality constraint. In: Proceedings 13th National Conference on Artificial Intelligence (AAAI 1996), pp. 209\u2013215 (1996)"},{"key":"7_CR11","unstructured":"Frisch, A.M., Jefferson, C., Miguel, I.: Symmetry breaking as a prelude to implied constraints: A constraint modelling pattern. In: Proceedings ECAI 2004, pp. 171\u2013175 (2004)"},{"key":"7_CR12","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1613\/jair.1351","volume":"21","author":"B. Hnich","year":"2004","unstructured":"Hnich, B., Smith, B.M., Walsh, T.: Dual modelling of permutation and injection problems. JAIR\u00a021, 357\u2013391 (2004)","journal-title":"JAIR"},{"key":"7_CR13","unstructured":"Velev, M., Gao, P.: Efficient SAT techniques for absolute encoding of permutation problems: Application to hamiltonian cycles. In: Proceedings SARA 2009 (to appear, 2009)"},{"key":"7_CR14","unstructured":"Rendl, A., Miguel, I., Gent, I.P., Jefferson, C.: Automatically enhancing constraint model instances during tailoring. In: Proceedings of the Eighth International Symposium on Abstraction, Reformulation and Approximation, SARA 2009 (to appear, 2009)"},{"key":"7_CR15","unstructured":"Jefferson, C.: Representations in Constraint Programming. PhD thesis, Computer Science Department, York University, UK (2007)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/3-540-46135-3_31","volume-title":"Principles and Practice of Constraint Programming - CP 2002","author":"P. Flener","year":"2002","unstructured":"Flener, P., Frisch, A.M., Hnich, B., Kiziltan, Z., Miguel, I., Pearson, J., Walsh, T.: Breaking row and column symmetries in matrix models. In: Van Hentenryck, P. (ed.) CP 2002. LNCS, vol.\u00a02470, pp. 462\u2013476. Springer, Heidelberg (2002)"},{"key":"7_CR17","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/11941439_9","volume-title":"AI 2006: Advances in Artificial Intelligence","author":"C.W. Choi","year":"2006","unstructured":"Choi, C.W., Harvey, W., Lee, J.H.M., Stuckey, P.J.: Finite domain bounds consistency revisited. In: Sattar, A., Kang, B.-h. (eds.) AI 2006. LNCS (LNAI), vol.\u00a04304, pp. 49\u201358. Springer, Heidelberg (2006)"},{"key":"7_CR18","unstructured":"Walsh, T.: Breaking value symmetry. In: Proceedings of AAAI 2008 (2008)"},{"key":"7_CR19","unstructured":"Debruyne, R., Bessi\u00e8re, C.: Some practicable filtering techniques for the constraint satisfaction problem. In: Proceedings 15th International Joint Conference on Artificial Intelligence (IJCAI 1997), pp. 412\u2013417 (1997)"}],"container-title":["Lecture Notes in Computer Science","Principles and Practice of Constraint Programming - CP 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04244-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:22:37Z","timestamp":1558538557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04244-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042430","9783642042447"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04244-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}