{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T18:22:32Z","timestamp":1758824552933},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1986,12,1]],"date-time":"1986-12-01T00:00:00Z","timestamp":533779200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Graphs and Combinatorics"],"published-print":{"date-parts":[[1986,12]]},"DOI":"10.1007\/bf01788090","type":"journal-article","created":{"date-parts":[[2005,6,19]],"date-time":"2005-06-19T11:37:00Z","timestamp":1119181020000},"page":"173-177","source":"Crossref","is-referenced-by-count":14,"title":["How to find many counterfeit coins?"],"prefix":"10.1007","volume":"2","author":[{"given":"L.","family":"Pyber","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF01788090_CR1","volume-title":"Dynamic Programming","author":"R. Bellman","year":"1957","unstructured":"Bellman, R.: Dynamic Programming. Princeton: Princeton Univ. Press 1957"},{"key":"BF01788090_CR2","first-page":"119","volume":"4","author":"R. Bellman","year":"1961","unstructured":"Bellman, R., Glass, B.: On various versions of the defective coin problem. Inf. Control4, 119\u2013131 (1961)","journal-title":"Inf. Control"},{"key":"BF01788090_CR3","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1080\/00029890.1963.11990056","volume":"70","author":"S.S. Cairns","year":"1963","unstructured":"Cairns, S.S.: Balance scale sorting. Amer. Math. Mon.70, 136\u2013143 (1963)","journal-title":"Amer. Math. Mon."},{"key":"BF01788090_CR4","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/B978-0-7204-2262-7.50028-4","volume-title":"A Survey of Combinatorial Theory","author":"G.O.H. Katona","year":"1973","unstructured":"Katona, G.O.H.: Combinatorial search problems. In: A Survey of Combinatorial Theory, edited by J.N. Srivastava, et al., pp. 285\u2013308. Amsterdam: North Holland 1973"},{"key":"BF01788090_CR5","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1080\/0025570X.1977.11976622","volume":"50","author":"B. Manvel","year":"1977","unstructured":"Manvel, B.: Counterfeit coin problems. Math. Mag.50, 90\u201392 (1977)","journal-title":"Math. Mag."},{"key":"BF01788090_CR6","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/TIT.1979.1056091","volume":"25","author":"D.G. Mead","year":"1979","unstructured":"Mead, D.G.: The average number of weighings to locate a counterfeit coin. IEEE Trans. Inf. Theory25, 616\u2013617 (1979)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"BF01788090_CR7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.2307\/3608991","volume":"31","author":"C.A.B. Smith","year":"1947","unstructured":"Smith, C.A.B.: The counterfeit coin problem. Math. Gaz.31, 31\u201339 (1947)","journal-title":"Math. Gaz."},{"key":"BF01788090_CR8","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0012-365X(83)90123-1","volume":"46","author":"R. Tosic","year":"1983","unstructured":"Tosic, R.: Two counterfeit coins. Discrete Math.46, 295\u2013298 (1983)","journal-title":"Discrete Math."},{"key":"BF01788090_CR9","unstructured":"Tosic, R.: Three counterfeit coins (to appear)"},{"key":"BF01788090_CR10","first-page":"97","volume":"14","author":"R. Tosic","year":"1984","unstructured":"Tosic, R.: Four counterfeit coins. Rev. Res. Fac. Sci. Univ. Novi Sad14, 97\u2013108 (1984)","journal-title":"Rev. Res. Fac. Sci. Univ. Novi Sad"},{"key":"BF01788090_CR11","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/TIT.1982.1056434","volume":"28","author":"K. Winkelmann","year":"1982","unstructured":"Winkelmann, K.: An improved strategy for a counterfeit coin problem. IEEE Trans. Inf. Theory28 120\u2013122 (1982)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Graphs and Combinatorics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01788090.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01788090\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01788090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T13:12:22Z","timestamp":1557493942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01788090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1986,12]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1986,12]]}},"alternative-id":["BF01788090"],"URL":"https:\/\/doi.org\/10.1007\/bf01788090","relation":{},"ISSN":["0911-0119","1435-5914"],"issn-type":[{"value":"0911-0119","type":"print"},{"value":"1435-5914","type":"electronic"}],"subject":[],"published":{"date-parts":[[1986,12]]}}}