{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:39Z","timestamp":1740122499205,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T00:00:00Z","timestamp":1466640000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The National Key Basic Research Program of China","award":["2013CB834204"],"award-info":[{"award-number":["2013CB834204"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61171082","61571243"],"award-info":[{"award-number":["61171082","61571243"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s10623-016-0239-y","type":"journal-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T02:48:22Z","timestamp":1466650102000},"page":"455-465","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On the snake-in-the-box codes for rank modulation under Kendall\u2019s $$\\tau $$ \u03c4 -metric"],"prefix":"10.1007","volume":"83","author":[{"given":"Xiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fang-Wei","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,23]]},"reference":[{"key":"239_CR1","doi-asserted-by":"crossref","unstructured":"Abbott H.L., Katchalski M.: On the snake in the box problem. J. Comb. Theory Ser. B 45, 13\u201324 (1988).","DOI":"10.1016\/0095-8956(88)90051-2"},{"key":"239_CR2","doi-asserted-by":"crossref","unstructured":"Barg A., Mazumdar A.: Codes in permutations and error correction for rank modulation. IEEE Trans. Inf. Theory 56, 3158\u20133165 (2010).","DOI":"10.1109\/TIT.2010.2048455"},{"key":"239_CR3","doi-asserted-by":"crossref","unstructured":"Buzaglo S., Etzion T.: Bounds on the size of permutation codes with the Kendall $$\\tau $$ \u03c4 -metric. IEEE Trans. Inf. Theory 61, 3241\u20133250 (2015).","DOI":"10.1109\/TIT.2015.2424701"},{"key":"239_CR4","unstructured":"Deza M., Huang H.: Metrics on permutations, a survey. J. Comb. Inf. Sys. Sci. 23, 173\u2013185 (1988)."},{"key":"239_CR5","doi-asserted-by":"crossref","unstructured":"Farnoud F., Skachek V., Milenkovic O.: Error-correction in falsh memories via codes in the Ulam metric. IEEE Trans. Inf. Theory 59, 3003\u20133020 (2013).","DOI":"10.1109\/TIT.2013.2239700"},{"key":"239_CR6","doi-asserted-by":"crossref","unstructured":"Gad E.E., Langberg M., Schwartz M., Bruck J.: Constant-weight Gray codes for local rank modulation. IEEE Trans. Inf. Theory 57, 7431\u20137442 (2011).","DOI":"10.1109\/TIT.2011.2162570"},{"key":"239_CR7","doi-asserted-by":"crossref","unstructured":"Gad E.E., Langberg M., Schwartz M., Bruck J.: Generalized gray codes for local rank modulation. IEEE Trans. Inf. Theory 59, 6664\u20136673 (2013).","DOI":"10.1109\/TIT.2013.2268534"},{"key":"239_CR8","unstructured":"Gray F.: Pulse code communication. U.S. Patent 2632058 (1953)."},{"key":"239_CR9","doi-asserted-by":"crossref","unstructured":"Horvitz M., Etzion T.: Constructions of snake-in-the-box codes for rank modulation. IEEE Trans. Inf. Theory 60, 7016\u20137025 (2014).","DOI":"10.1109\/TIT.2014.2359193"},{"key":"239_CR10","doi-asserted-by":"crossref","unstructured":"Jiang A., Mateescu R., Schwartz M., Bruck J.: Rank modulation for flash memories. IEEE Trans. Inf. Theory 55, 2659\u20132673 (2009).","DOI":"10.1109\/TIT.2009.2018336"},{"key":"239_CR11","doi-asserted-by":"crossref","unstructured":"Jiang A., Schwartz M., Bruck J.: Correcting charge-constrained errors in the rank-modulation scheme. IEEE Trans. Inf. Theory 56, 2112\u20132120 (2010).","DOI":"10.1109\/TIT.2010.2043764"},{"key":"239_CR12","doi-asserted-by":"crossref","unstructured":"Kl\u00f8ve T., Lin T.T., Tsai S.C., Tzeng W.G.: Permutation arrays under the Chebyshev distance. IEEE Trans. Inf. Theory 56, 2611\u20132617 (2010).","DOI":"10.1109\/TIT.2010.2046212"},{"key":"239_CR13","doi-asserted-by":"crossref","unstructured":"Savage C.D.: A survey of combinatorial gray codes. SIAM Rev. 39, 605\u2013629 (1997).","DOI":"10.1137\/S0036144595295272"},{"key":"239_CR14","doi-asserted-by":"crossref","unstructured":"Savage C.D., Winkler P.: Monotone gray codes and middle levels problem. J. Comb. Theory Ser. A 70, 230\u2013248 (1995).","DOI":"10.1016\/0097-3165(95)90091-8"},{"key":"239_CR15","doi-asserted-by":"crossref","unstructured":"Tamo I., Schwartz M.: Correcting limited-magnitude errors in the rank-modulation scheme. IEEE Trans. Inf. Theory 56, 2551\u20132560 (2010).","DOI":"10.1109\/TIT.2010.2046241"},{"key":"239_CR16","doi-asserted-by":"crossref","unstructured":"Yehezkeally Y., Schwartz M.: Snake-in-the-box codes for rank modulation. IEEE Trans. Inf. Theory 58, 5471\u20135483 (2012).","DOI":"10.1109\/TIT.2012.2196755"},{"key":"239_CR17","doi-asserted-by":"crossref","unstructured":"Zhang Y.W., Ge G.N.: Snake-in-the-box codes for rank modulation under Kendall\u2019s $$\\tau $$ \u03c4 -metric. IEEE Trans. Inf. Theory 62, 151\u2013158 (2016).","DOI":"10.1109\/TIT.2015.2502602"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0239-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0239-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0239-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0239-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:54:11Z","timestamp":1498308851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0239-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,23]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["239"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0239-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,6,23]]}}}