{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T05:23:58Z","timestamp":1703222638190},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,4,13]],"date-time":"2011-04-13T00:00:00Z","timestamp":1302652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s10623-011-9505-1","type":"journal-article","created":{"date-parts":[[2011,4,12]],"date-time":"2011-04-12T06:09:14Z","timestamp":1302588554000},"page":"199-208","source":"Crossref","is-referenced-by-count":5,"title":["Constructions of covering arrays of strength five"],"prefix":"10.1007","volume":"62","author":[{"given":"Lijun","family":"Ji","sequence":"first","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianxing","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,13]]},"reference":[{"key":"9505_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511549533","volume-title":"Design Theory","author":"T. Beth","year":"1999","unstructured":"Beth T., Jungnickel D., Lenz H.: Design Theory. Cambridge University Press, Cambridge (1999)"},{"key":"9505_CR2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/A:1016505309092","volume":"26","author":"M. Buratti","year":"2002","unstructured":"Buratti M.: Cyclic designs with block size 4 and related optimal optical orthogonal codes. Des. Codes Cryptogr. 26, 111\u2013125 (2002)","journal-title":"Des. Codes Cryptogr."},{"key":"9505_CR3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/S0012-365X(03)00264-4","volume":"279","author":"Y. Chang","year":"2004","unstructured":"Chang Y., Yin J.: Further results on optimal optical orthogonal codes with weight 4. Discret. Math. 279, 135\u2013151 (2004)","journal-title":"Discret. Math."},{"key":"9505_CR4","first-page":"121","volume":"58","author":"C.J. Colbourn","year":"2004","unstructured":"Colbourn C.J.: Combinatorial aspects of covering arrays. Le Matematiche (Catania) 58, 121\u2013167 (2004)","journal-title":"Le Matematiche (Catania)"},{"key":"9505_CR5","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1016\/j.disc.2007.07.050","volume":"308","author":"C.J. Colbourn","year":"2008","unstructured":"Colbourn C.J.: Strength two covering arrays: existence tables and projection. Discret. Math. 308, 772\u2013786 (2008)","journal-title":"Discret. Math."},{"key":"9505_CR6","unstructured":"Colbourn C.J.: Covering table for t\u00a0=\u00a02,3,4,5,6. http:\/\/www.public.asu.edu\/~ccolbou\/src\/tabby\/catable.html ."},{"key":"9505_CR7","volume-title":"The CRC Handbook of Combinatorial Designs","author":"C.J. Colbourn","year":"2007","unstructured":"Colbourn C.J., Dinitz J.H.: The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton, FL (2007)"},{"key":"9505_CR8","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1002\/jcd.20065","volume":"14","author":"C.J. Colbourn","year":"2006","unstructured":"Colbourn C.J., Martirosyan S.S., Mullen G.L., Shasha D.E., Sherwood G.B., Yucas J.L.: Products of mixed covering arrays of strength two. J. Comb. Des. 14, 124\u2013138 (2006)","journal-title":"J. Comb. Des."},{"key":"9505_CR9","doi-asserted-by":"crossref","first-page":"33C57","DOI":"10.1007\/s10623-006-0020-8","volume":"41","author":"C.J. Colbourn","year":"2006","unstructured":"Colbourn C.J., Martirosyan S.S., Trung T.V., Walker R.A. II: Roux-type constructions for covering arrays of strengths three and four. Des. Codes Cryptogr. 41, 33C57 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"9505_CR10","doi-asserted-by":"crossref","first-page":"287C297","DOI":"10.6028\/jres.113.022","volume":"113","author":"M. Forbes","year":"2008","unstructured":"Forbes M., Lawrence J., Lei Y., Kacker R.N., Kuhn D.R.: Refining the in-parameter-order strategy for constructing covering arrays. J. Res. Nat. Inst. Stand. Technol. 113, 287C297 (2008)","journal-title":"J. Res. Nat. Inst. Stand. Technol."},{"key":"9505_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1478-6","volume-title":"Orthogonal Arrays","author":"A.S Hedayat","year":"1999","unstructured":"Hedayat A.S, Slone N.J.A., Stufken J.: Orthogonal Arrays. Springer, New York (1999)"},{"key":"9505_CR12","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.jcta.2009.06.002","volume":"117","author":"L. Ji","year":"2010","unstructured":"Ji L., Yin J.: Constructions of new orthogonal arrays and covering arrays of strength three. J. Comb. Theory A 117, 236\u2013247 (2010)","journal-title":"J. Comb. Theory A"},{"key":"9505_CR13","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/0095-8956(89)90054-3","volume":"46","author":"K.A. Johnson","year":"1989","unstructured":"Johnson K.A., Entringer R.C.: Largest induced subgraphs of the n-cube that contain no 4-cycles. J. Comb. Theory B 46, 346\u2013355 (1989)","journal-title":"J. Comb. Theory B"},{"key":"9505_CR14","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1002\/jcd.20114","volume":"15","author":"M.S. Keranen","year":"2007","unstructured":"Keranen M.S., Kreher D.L.: Transverse quadruple systems with five holes. J. Comb. Des. 15, 315\u2013340 (2007)","journal-title":"J. Comb. Des."},{"key":"9505_CR15","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10623-008-9235-1","volume":"50","author":"Y. Li","year":"2009","unstructured":"Li Y., Ji L., Yin J.: Covering arrays of strength 3 and 4 from holey difference matrices. Des. Codes Cryptogr. 50, 339\u2013350 (2009)","journal-title":"Des. Codes Cryptogr."},{"key":"9505_CR16","doi-asserted-by":"crossref","unstructured":"Nayeri P., Colbourn C.J., Konjevod G.: Randomized Postoptimization of Covering Arrays. Lecture Notes in Computer Science vol. 5874, pp 408\u2013419 (2009).","DOI":"10.1007\/978-3-642-10217-2_40"},{"key":"9505_CR17","doi-asserted-by":"crossref","first-page":"202C213","DOI":"10.1002\/jcd.20067","volume":"14","author":"G.B. Sherwood","year":"2006","unstructured":"Sherwood G.B., Martirosyan S.S., Colbourn C.J.: Covering arrays of higher strength from permutation vectors. J. Comb. Des. 14, 202C213 (2006)","journal-title":"J. Comb. Des."},{"key":"9505_CR18","volume-title":"Combinatorial Designs: Construction and Analysis","author":"D.R. Stinson","year":"2004","unstructured":"Stinson D.R.: Combinatorial Designs: Construction and Analysis. Springer, New York (2004)"},{"key":"9505_CR19","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.jcta.2003.09.005","volume":"104","author":"J. Yin","year":"2003","unstructured":"Yin J.: Constructions of difference covering arrays. J. Comb. Theory A 104, 327\u2013339 (2003)","journal-title":"J. Comb. Theory A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9505-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9505-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9505-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T23:19:36Z","timestamp":1560122376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9505-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,13]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["9505"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9505-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,13]]}}}