{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T19:10:20Z","timestamp":1734635420837,"version":"3.32.0"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1992,9,1]],"date-time":"1992-09-01T00:00:00Z","timestamp":715305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1992,9]]},"DOI":"10.1007\/bf00141973","type":"journal-article","created":{"date-parts":[[2004,11,6]],"date-time":"2004-11-06T01:25:01Z","timestamp":1099704301000},"page":"287-298","source":"Crossref","is-referenced-by-count":1,"title":["Design machines: Algebraically well described interconnection networks"],"prefix":"10.1007","volume":"2","author":[{"given":"Thomas","family":"Beth","sequence":"first","affiliation":[]},{"given":"Volker","family":"Hatz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0061260","volume-title":"Cyclic difference sets","author":"L.D. Baumert","year":"1971","unstructured":"L.D. Baumert, Cyclic difference sets, Springer-Verlag, Berlin, Heidelberg, (1971)."},{"key":"CR2","doi-asserted-by":"crossref","unstructured":"J.C. Bermond, J. Bond, M. Paoli, C. Peyrat, Graphs and interconnection networks: diameter and vulnerability, in Proceedings of the Ninth British Combinatorial Conference, (1983), pp. 1?30.","DOI":"10.1017\/CBO9781107325548.002"},{"key":"CR3","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/0743-7315(86)90008-0","volume":"Vol. 3","author":"J.C. Bermond","year":"1986","unstructured":"J.C. Bermond, C. Delorme, J.-J. Quisquater, Strategies for interconnection networks: some methods from graph theory, Journal of Parallel and Distributed Computing, Vol. 3 (1986), pp. 433?449.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"CR4","first-page":"1","volume":"Vol. 136","author":"T. Beth","year":"1979","unstructured":"T. Beth, On resolutions of steiner systems, Mitt. Math. Sem. Giessen, Vol. 136 (1979), pp. 1?103.","journal-title":"Mitt. Math. Sem. Giessen"},{"key":"CR5","unstructured":"T. Beth, D. Jungnickel, H. Lenz, Design theory, B.I.-Wissenschaftsverlag, (1985)."},{"key":"CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511662102","volume-title":"Parallelisms of complete designs","author":"P.J. Cameron","year":"1976","unstructured":"P.J. Cameron, Parallelisms of complete designs, Cambridge University Press, Cambridge (1976)."},{"key":"CR7","doi-asserted-by":"crossref","unstructured":"C.J. Colbourn, P.C. van Oorschot, Applications of combinatorial designs in computer science, ACM Computing Surveys, Vol. 21, June (1989).","DOI":"10.1145\/66443.66446"},{"key":"CR8","volume-title":"Combinatorial Theory","author":"M. Hall Jr.","year":"1986","unstructured":"M. Hall, Jr., Combinatorial Theory, John Wiley & Sons, New York, (1986)."},{"key":"CR9","doi-asserted-by":"crossref","DOI":"10.21236\/AD0705364","volume-title":"Graph Theory","author":"F. Harary","year":"1969","unstructured":"F. Harary, Graph Theory, Addison-Wesley, Reading, MA, (1969)."},{"key":"CR10","unstructured":"inmos, Transputer reference manual, Prentice-Hall, Englewood Cliffs, NJ, (1988)."},{"key":"CR11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4792.001.0001","volume-title":"Multicomputer networks","author":"D.A. Reed","year":"1987","unstructured":"D.A. Reed, R.M. Fujimoto, Multicomputer networks, MIT Press, Cambridge, MA (1987)."},{"key":"CR12","volume-title":"Finite groups and finite geometries","author":"T. Tsuzuku","year":"1982","unstructured":"T. Tsuzuku, Finite groups and finite geometries, Cambridge University Press, Cambridge, MA, (1982)."},{"key":"CR13","unstructured":"C. Wu, T. Feng, Tutorial: interconnection networks for parallel and distributed processing, Computer Society Press, (1984)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00141973.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00141973\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00141973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T18:32:25Z","timestamp":1734633145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00141973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,9]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,9]]}},"alternative-id":["BF00141973"],"URL":"https:\/\/doi.org\/10.1007\/bf00141973","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1992,9]]}}}