{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:47:55Z","timestamp":1710359275675},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T00:00:00Z","timestamp":1286236800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1007\/s10623-010-9435-3","type":"journal-article","created":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T10:11:22Z","timestamp":1286187082000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Decoding permutation arrays with ternary vectors"],"prefix":"10.1007","volume":"61","author":[{"given":"Chia-Jung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Te-Tsung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Min-Zheng","family":"Shieh","sequence":"additional","affiliation":[]},{"given":"Shi-Chun","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Hsin-Lung","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,5]]},"reference":[{"issue":"4","key":"9435_CR1","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1109\/TIT.2003.809507","volume":"49","author":"J.C. Chang","year":"2003","unstructured":"Chang J.C., Chen R.J., Kl\u00f8ve T., Tsai S.C.: Distance-preserving mappings from binary vectors to permutations. IEEE Trans. Inform. Theory 49(4), 1054\u20131059 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9435_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"W.C. Huffman","year":"2003","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"issue":"6","key":"9435_CR3","doi-asserted-by":"crossref","first-page":"2611","DOI":"10.1109\/TIT.2010.2046212","volume":"56","author":"T. Kl\u00f8ve","year":"2010","unstructured":"Kl\u00f8ve T., Lin T.-T., Tsai S.-C., Tzeng W.-G.: Permutation arrays under the Chebyshev distance. IEEE Trans. Inform. Theory 56(6), 2611\u20132617 (2010)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9435_CR4","volume-title":"The Art of Computer Programming, Volume 3: Sorting and Searching","author":"D.E. Knuth","year":"1998","unstructured":"Knuth D.E.: The Art of Computer Programming, Volume 3: Sorting and Searching, 2nd edn. Addison Wesley Longman, Reading, MA (1998)","edition":"2"},{"key":"9435_CR5","unstructured":"Lin T.-T., Tsai S.-C., Tzeng W.-G.: Efficient encoding and decoding with permutation arrays. In: Proceedings 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July, 2008, pp. 211\u2013214."},{"issue":"7","key":"9435_CR6","doi-asserted-by":"crossref","first-page":"3251","DOI":"10.1109\/TIT.2008.924716","volume":"54","author":"T.-T. Lin","year":"2008","unstructured":"Lin T.-T., Tsai S.-C., Wu H.-L.: Simple distance-preserving mapping from ternary vectors to permutations. IEEE Trans. Inform. Theory 54(7), 3251\u20133256 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"9435_CR7","first-page":"45","volume":"54","author":"A.J.H. Vinck","year":"2000","unstructured":"Vinck A.J.H.: Coded modulation for powerline communications. Proc. Int. J. Electron. Commun. 54(1), 45\u201349 (2000)","journal-title":"Proc. Int. J. Electron. Commun."},{"key":"9435_CR8","unstructured":"Vinck A.J.H., H\u00e4ring J.: Coding and modulation for power-line communications. In: Proceedings of Interbational Symposium on Power Line Communication, Limerick, Ireland, April, 2000."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9435-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9435-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9435-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:28Z","timestamp":1559231908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9435-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,5]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,10]]}},"alternative-id":["9435"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9435-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,5]]}}}