{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T16:05:00Z","timestamp":1706544300368},"reference-count":14,"publisher":"Elsevier BV","issue":"1-3","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1016\/0020-0255(95)00047-s","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T01:00:31Z","timestamp":1049504431000},"page":"61-76","source":"Crossref","is-referenced-by-count":4,"title":["Constrained many-to-one string editing with memory"],"prefix":"10.1016","volume":"86","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[]},{"given":"Slobodan V.","family":"Petrovi\u0107","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/0020-0255(95)00047-S_BIB1","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIT.1985.1057102","article-title":"The rate-distortion region for multiple descriptions without excess rate","volume":"IT-31","author":"Ahlswede","year":"1985","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"10.1016\/0020-0255(95)00047-S_BIB2","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/TIT.1975.1055419","article-title":"Decoding for channels with insertions, deletions, and substitutions with applications to speech recognition","volume":"IT-21","author":"Bahl","year":"1975","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"10.1016\/0020-0255(95)00047-S_BIB3","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/BF00196912","article-title":"A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance","volume":"3","author":"Goli\u0107","year":"1991","journal-title":"J. Cryptology"},{"key":"10.1016\/0020-0255(95)00047-S_BIB4","first-page":"472","article-title":"A generalized correlation attack with a probabilistic constrained edit distance","author":"Goli\u0107","year":"1993"},{"key":"10.1016\/0020-0255(95)00047-S_BIB5","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/356827.356830","article-title":"Approximate string matching","volume":"12","author":"Hall","year":"1980","journal-title":"Comput. Surveys"},{"key":"10.1016\/0020-0255(95)00047-S_BIB6","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"Levenshtein","year":"1966","journal-title":"Soviet Phys. Dokl."},{"key":"10.1016\/0020-0255(95)00047-S_BIB7","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/0020-0255(86)90061-7","article-title":"Constrained string editing","volume":"40","author":"Oommen","year":"1986","journal-title":"Inform. Sci."},{"issue":"5","key":"10.1016\/0020-0255(95)00047-S_BIB8","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1109\/TPAMI.1987.4767962","article-title":"Recognition of noisy subsequences using constrained edit distances","volume":"PAMI-9","author":"Oommen","year":"1987","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/0020-0255(95)00047-S_BIB9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/0020-0255(93)90131-5","article-title":"String editing under a combination of constraints","volume":"74","author":"Petrovi\u0107","year":"1993","journal-title":"Inform. Sci."},{"key":"10.1016\/0020-0255(95)00047-S_BIB10","article-title":"Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison","author":"Kruskal","year":"1983"},{"issue":"4","key":"10.1016\/0020-0255(95)00047-S_BIB11","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1137\/0126070","article-title":"On the theory and computation of evolutionary distances","volume":"26","author":"Sellers","year":"1974","journal-title":"SIAM J. Appl. Math."},{"issue":"5","key":"10.1016\/0020-0255(95)00047-S_BIB12","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","article-title":"Correlation-immunity of nonlinear combining functions for cryptographic applications","volume":"IT-30","author":"Siegenthaler","year":"1984","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"10.1016\/0020-0255(95)00047-S_BIB13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","article-title":"Decrypting a class of stream ciphers using ciphertext only","volume":"C-34","author":"Siegenthaler","year":"1985","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"10.1016\/0020-0255(95)00047-S_BIB14","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/TIT.1986.1057177","article-title":"On secret sharing communication systems with two or three channels","volume":"IT-32","author":"Yamamoto","year":"1986","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002002559500047S?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002002559500047S?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T02:20:25Z","timestamp":1556158825000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/002002559500047S"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":14,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["002002559500047S"],"URL":"https:\/\/doi.org\/10.1016\/0020-0255(95)00047-s","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[1995,9]]}}}