{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T20:33:24Z","timestamp":1648758804375},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,6,19]],"date-time":"2007-06-19T00:00:00Z","timestamp":1182211200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2007,9,5]]},"DOI":"10.1007\/s10623-007-9089-y","type":"journal-article","created":{"date-parts":[[2007,6,18]],"date-time":"2007-06-18T15:53:33Z","timestamp":1182182013000},"page":"91-94","source":"Crossref","is-referenced-by-count":1,"title":["New lower bounds for multiple coverings"],"prefix":"10.1007","volume":"45","author":[{"given":"Esa Antero","family":"Seuranen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,6,19]]},"reference":[{"key":"9089_CR1","volume-title":"Covering codes","author":"G Cohen","year":"1997","unstructured":"Cohen G, Honkala I, Litsyn S and Lobstein A (1997). Covering codes. North-Holland, Amsterdam"},{"key":"9089_CR2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/BF01388486","volume":"3","author":"H H\u00e4m\u00e4l\u00e4inen","year":"1993","unstructured":"H\u00e4m\u00e4l\u00e4inen H, Honkala I, Kaikkonen M and Litsyn S (1993). Bounds for binary multiple covering codes. Des Codes Cryptogr 3: 251\u2013275","journal-title":"Des Codes Cryptogr"},{"key":"9089_CR3","unstructured":"McKay BD (1990) Nauty user\u2019s guide (version 1.5), Computer Science Department, Australian National University, Tech. Report TR-CS-90-02"},{"key":"9089_CR4","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1109\/TIT.2005.860449","volume":"52","author":"PRJ \u00d6sterg\u00e5rd","year":"2006","unstructured":"\u00d6sterg\u00e5rd PRJ and Seuranen EA (2006). Unidirectional covering codes. IEEE Trans Inform Theory 52: 336\u2013340","journal-title":"IEEE Trans Inform Theory"},{"key":"9089_CR5","unstructured":"GLPK (GNU Linear Programming Kit) [electronic], available at <URL: http:\/\/www.gnu.org\/software \/glpk\/>"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9089-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9089-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9089-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:08Z","timestamp":1559245808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9089-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,19]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,9,5]]}},"alternative-id":["9089"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9089-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,6,19]]}}}