{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T12:40:05Z","timestamp":1749040805410,"version":"3.41.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T00:00:00Z","timestamp":1470268800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11371144"],"award-info":[{"award-number":["11371144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Young Scholar Foundation of Tongji University","award":["2013KJ031"],"award-info":[{"award-number":["2013KJ031"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11101360"],"award-info":[{"award-number":["11101360"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10623-016-0255-y","type":"journal-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T06:27:13Z","timestamp":1470292033000},"page":"685-690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Proof of a conjecture of Kl\u00f8ve on permutation codes under the Chebychev distance"],"prefix":"10.1007","volume":"83","author":[{"given":"Victor J. W.","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yiting","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"issue":"7","key":"255_CR1","doi-asserted-by":"crossref","first-page":"3158","DOI":"10.1109\/TIT.2010.2048455","volume":"56","author":"A Barg","year":"2010","unstructured":"Barg A., Mazumdar A.: Codes in permutations and error correction for rank modulation. IEEE Trans. Inf. Theory 56(7), 3158\u20133165 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"255_CR2","doi-asserted-by":"crossref","first-page":"3241","DOI":"10.1109\/TIT.2015.2424701","volume":"61","author":"S Buzaglo","year":"2015","unstructured":"Buzaglo S., Etzion T.: Bounds on the size of permutation codes with the Kendall $$\\tau $$ \u03c4 -metric. IEEE Trans. Inf. Theory 61(6), 3241\u20133249 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"255_CR3","first-page":"173","volume":"23","author":"M Deza","year":"1998","unstructured":"Deza M., Huang H.: Metrics on permutations, a survey. J. Comb. Inf. Syst. Sci. 23, 173\u2013185 (1998).","journal-title":"J. Comb. Inf. Syst. Sci."},{"issue":"5","key":"255_CR4","doi-asserted-by":"crossref","first-page":"3003","DOI":"10.1109\/TIT.2013.2239700","volume":"59","author":"F Farnoud","year":"2013","unstructured":"Farnoud F., Skachek V., Milenkovic O.: Error-corection in flash memories via codes in the Ulam metric. IEEE Trans. Inf. Theory 59(5), 3003\u20133020 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"255_CR5","first-page":"1655","volume":"50","author":"F Gao","year":"2013","unstructured":"Gao F., Yang Y., Ge G.: An improvement to Gilbert\u2013Varshamov bound for permutation codes. IEEE Trans. Inf. Theory 50, 1655\u20131664 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Jiang, A., Schwartz, M., Bruck, J.: Error-correcting codes for rank modulation. In: Proceedings of IEEE International Symposium on Information Theory, pp. 1736\u20131740 (2008).","key":"255_CR6","DOI":"10.1109\/ISIT.2008.4595285"},{"issue":"5","key":"255_CR7","doi-asserted-by":"crossref","first-page":"2112","DOI":"10.1109\/TIT.2010.2043764","volume":"56","author":"A Jiang","year":"2010","unstructured":"Jiang A., Schwartz M., Bruck J.: Rank modulation for flash memories. IEEE Trans. Inf. Theory 56(5), 2112\u20132120 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"255_CR8","volume-title":"Rank Correlation Methods","author":"M Kendall","year":"1990","unstructured":"Kendall M., Gibbons J.D.: Rank Correlation Methods. Oxford University Press, New York (1990)."},{"issue":"6","key":"255_CR9","doi-asserted-by":"crossref","first-page":"2611","DOI":"10.1109\/TIT.2010.2046212","volume":"56","author":"T Kl\u00f8ve","year":"2010","unstructured":"Kl\u00f8ve T., Lin T.-T., Tsai S.-C., Tzeng W.-G.: Permutation arrays under the Chebyshev distance. IEEE Trans. Inf. Theory 56(6), 2611\u20132617 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"255_CR10","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10623-010-9454-0","volume":"59","author":"T Kl\u00f8ve","year":"2011","unstructured":"Kl\u00f8ve T.: Lower bounds on the size of spheres of permutations under the Chebychev distance. Des. Codes Cryptogr. 59, 183\u2013191 (2011).","journal-title":"Des. Codes Cryptogr."},{"doi-asserted-by":"crossref","unstructured":"Ryser, H.J.: Combinatorial Mathematics. The Carus Mathematical Monographs #14. The Mathematical Association of America, Buffalo (1963)","key":"255_CR11","DOI":"10.5948\/UPO9781614440147"},{"unstructured":"Sloane, N.J.A.: The On-Line Encyclopedia of Integer Sequences. http:\/\/www.research.att.com\/~njas\/sequences\/","key":"255_CR12"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0255-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0255-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0255-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0255-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T12:26:46Z","timestamp":1749040006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0255-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,4]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["255"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0255-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,8,4]]}}}