{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:20:03Z","timestamp":1648588803912},"reference-count":4,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,5,1]],"date-time":"1995-05-01T00:00:00Z","timestamp":799286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,5]]},"DOI":"10.1007\/bf01388387","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T08:37:09Z","timestamp":1112431029000},"page":"253-259","source":"Crossref","is-referenced-by-count":10,"title":["On perfectt-shift codes in abelian groups"],"prefix":"10.1007","volume":"5","author":[{"given":"Akihiro","family":"Munemasa","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"P. Delsarte, An algebraic approach to the association schemes of coding theory,Philips Research Reports Suppl. Vol. 10 (1973)."},{"key":"CR2","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/18.212300","volume":"39","author":"V. I. Levenshtein","year":"1993","unstructured":"V. I. Levenshtein and A. J. Han Vinck, Perfect (d, k)-codes capable of correcting single peak-shifts,IEEE Trans. Inform. Theory Vol. 39 (1993) pp. 656?662.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR3","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane,The Theory of Error-Correcting Codes, North Holland Publ. Co., Amsterdam (1977)."},{"key":"CR4","doi-asserted-by":"crossref","first-page":"175","DOI":"10.2140\/pjm.1966.18.175","volume":"18","author":"O. Rothaus","year":"1966","unstructured":"O. Rothaus and J. G. Thompson. A combinatorial problem in the symmetric group,Pacific J. Math. Vol. 18 (1966) pp. 175?178.","journal-title":"Pacific J. Math."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388387\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388387.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388387\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T16:14:18Z","timestamp":1556813658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,5]]},"references-count":4,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,5]]}},"alternative-id":["BF01388387"],"URL":"https:\/\/doi.org\/10.1007\/bf01388387","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,5]]}}}