{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T07:52:40Z","timestamp":1761292360346},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,8,14]],"date-time":"2006-08-14T00:00:00Z","timestamp":1155513600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2006,11]]},"DOI":"10.1007\/s10878-006-9634-z","type":"journal-article","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T19:28:54Z","timestamp":1155842934000},"page":"297-301","source":"Crossref","is-referenced-by-count":21,"title":["Construction of d(H)-disjunct matrix for group testing in hypergraphs"],"prefix":"10.1007","volume":"12","author":[{"given":"Hong","family":"Gao","sequence":"first","affiliation":[]},{"given":"F. K.","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"My T.","family":"Thai","sequence":"additional","affiliation":[]},{"given":"Weili","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Taieb","family":"Znati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,8,14]]},"reference":[{"key":"9634_CR1","doi-asserted-by":"crossref","first-page":"6241","DOI":"10.1093\/nar\/19.22.6241","volume":"19","author":"E Barillot","year":"1991","unstructured":"Barillot E, Lacroix B, Cohen D (1991) Theoretical analysis of library screening using a N-dimensional pooling designs. Nucleic Acids Res 19:6241\u20136247","journal-title":"Nucleic Acids Res"},{"key":"9634_CR2","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1214\/aoms\/1177731363","volume":"14","author":"R Dorfman","year":"1943","unstructured":"Dorfman R (1943) The detection of defective members of large populations. Ann Math Statist 14:436\u2013440","journal-title":"Ann Math Statist"},{"key":"9634_CR3","volume-title":"Combinatorial group testing and its applications","author":"D-Z Du","year":"1999","unstructured":"Du D-Z, Hwang FK (1999) Combinatorial group testing and its applications (2nd ed.). World Scientific, Singapore","edition":"2"},{"key":"9634_CR4","volume-title":"Pooling designs: Group testing in molecular biology","author":"D-Z Du","year":"2006","unstructured":"Du D-Z, Hwang FK (2006) Pooling designs: Group testing in molecular biology. World Scientific, Singapore"},{"key":"9634_CR5","unstructured":"Du D-Z, Hwang FK, Wu W, Znati T (2004) A new construction of transversal designs, manuscript"},{"key":"9634_CR6","doi-asserted-by":"crossref","unstructured":"D\u2019ychkov AG, Macula AJ, Torney DC, Vilenkin PA (2001) Two models of nonadaptive group testing for designing screening experiments. In: Proc. 6th Int. Workshop on Model-Orented Designs and Analysis, pp. 63\u201375","DOI":"10.1007\/978-3-642-57576-1_8"},{"key":"9634_CR7","unstructured":"Farach M, Kannan S, Knill E, Muthukrishnan S (1997) Group testing problem with sequences in experimental molecular biology. In: Proc. Compression and Complexity of Sequences, pp 357\u2013367"},{"key":"9634_CR8","doi-asserted-by":"crossref","unstructured":"Ngo HQ, Du D-Z (2000) A survey on combinatorial group testing algorithms with applications to DNA library screening. In: Discrete mathematical problems with medical applications (New Brunswick, NJ, 1999), pp. 171\u2013182, DIMACS Ser. Discrete Math Theoret Comput Sci, 55, Amer Math Soc, Providence, RI","DOI":"10.1090\/dimacs\/055\/13"},{"key":"9634_CR9","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1090\/dimacs\/055\/10","volume":"55","author":"AJ Macula","year":"2000","unstructured":"Macula AJ, Torney DC, Villenkin PA (2000) Two-stage group testing for complexes in the presence of errors. DIMACS Sries Disc Math Theor Comput Sci 55:145\u2013157","journal-title":"DIMACS Sries Disc Math Theor Comput Sci"},{"key":"9634_CR10","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/S0166-218X(03)00191-4","volume":"137","author":"AJ Macula","year":"2004","unstructured":"Macula AJ, Rykov VV, Yekhanin S (2004) Trivial two-stage group testing for complexes using almost disjunct matrices. Disc Appl Math 137:97\u2013107","journal-title":"Disc Appl Math"},{"key":"9634_CR11","unstructured":"Marathe MV, Percus AG, Torney DC (2000) Combinatorial optimization in biology, manuscript"},{"key":"9634_CR12","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1023\/B:JOCO.0000017388.06583.04","volume":"7","author":"H Park","year":"2003","unstructured":"Park H, Wu W, Wu X, Zhao HG (2003) DNA screening, nonadaptive group testing, and simplicial complex, J Comb Optim 7:389\u2013394","journal-title":"J Comb Optim"},{"key":"9634_CR13","unstructured":"Thierry-Mieg N, Trilling L, Roch J-L (2004) Anovel pooling design for protein-protein interaction mapping. manuscript"},{"key":"9634_CR14","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF01609879","volume":"3","author":"DC Torney","year":"1999","unstructured":"Torney DC (1999) Sets pooling designs. Ann Comb 3:95\u2013101","journal-title":"Ann Comb"},{"key":"9634_CR15","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/0166-218X(95)00120-G","volume":"66","author":"E Triesch","year":"1996","unstructured":"Triesch E (1996) A group testing problem for hypergraphs of bounded rank. Disc Appl Math 66:185\u2013188","journal-title":"Disc Appl Math"},{"key":"9634_CR16","unstructured":"Wu W, Li C, Huang X, Li Y (2004) On error-tolerant DNA screening. Discrete Applied Mathematics"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-006-9634-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-006-9634-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-006-9634-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T04:18:11Z","timestamp":1559276291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-006-9634-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,14]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,11]]}},"alternative-id":["9634"],"URL":"https:\/\/doi.org\/10.1007\/s10878-006-9634-z","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,8,14]]}}}