{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:53:13Z","timestamp":1772740393182,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1999,5]]},"DOI":"10.1023\/a:1008379710317","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"235-242","source":"Crossref","is-referenced-by-count":52,"title":["Covering Arrays of Strength Three"],"prefix":"10.1007","volume":"16","author":[{"given":"M. A.","family":"Chateauneuf","sequence":"first","affiliation":[]},{"given":"Charles J.","family":"Colbourn","sequence":"additional","affiliation":[]},{"given":"D. L.","family":"Kreher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"199816_CR1","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1002\/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-E","volume":"4","author":"M. Atici","year":"1996","unstructured":"M. Atici, S. S. Magliveras, D. R. Stinson, and W.-D. Wei, Some recursive constructions for perfect hash functions, J. Combinat. Designs, Vol. 4 (1996) pp. 353-363.","journal-title":"J. Combinat. Designs"},{"key":"199816_CR2","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/32.605761","volume":"23","author":"D. M. Cohen","year":"1997","unstructured":"D. M. Cohen, S. R. Dalal, M. L. Fredman, and G. C. Patton, The AETG system: an approach to testing software based on combinatorial design, IEEE Trans. Software Engineering, Vol. 23 (1997) pp. 437-444.","journal-title":"IEEE Trans. Software Engineering"},{"key":"199816_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/52.536462","volume":"13","author":"D. M. Cohen","year":"1996","unstructured":"D. M. Cohen, S. R. Dalal, J. Parelius, and G. C. Patton, The combinatorial design approach to automatic test generation, IEEE Software, Vol. 13 (1996) pp. 83-88.","journal-title":"IEEE Software"},{"key":"199816_CR4","volume-title":"The CRC Handbook of Combinatorial Designs","year":"1996","unstructured":"C. J. Colbourn and J. H. Dinitz, editors, The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton (1996)."},{"key":"199816_CR5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1023\/A:1027389907339","volume":"9","author":"C. J. Colbourn","year":"1996","unstructured":"C. J. Colbourn and D. L. Kreher, Concerning difference matrices, Designs, Codes and Cryptography, Vol. 9 (1996) pp. 61-70.","journal-title":"Designs, Codes and Cryptography"},{"key":"199816_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/BF01195325","volume":"9","author":"L. Gargano","year":"1993","unstructured":"L. Gargano, J. K\u00f6rner, and U. Vaccaro, Sperner capacities, Graphs and Combinatorics, Vol. 9 (1993) pp. 31-46.","journal-title":"Graphs and Combinatorics"},{"key":"199816_CR7","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1017\/S0963548300001905","volume":"5","author":"A. P. Godbole","year":"1996","unstructured":"A. P. Godbole, D. E. Skipper, and R. A. Sunley, t-Covering arrays: upper bounds and Poisson approximations, Combinatorics, Probability and Computing, Vol. 5 (1996) pp. 105-118.","journal-title":"Combinatorics, Probability and Computing"},{"key":"199816_CR8","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1109\/18.335882","volume":"40","author":"J. K\u00f6rner","year":"1994","unstructured":"J. K\u00f6rner and M. Lucertini, Compressing inconsistent data, IEEE Trans. Information Theory, Vol. 40 (1994) pp. 706-715.","journal-title":"IEEE Trans. Information Theory"},{"key":"199816_CR9","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1002\/(SICI)1520-6610(1996)4:1<67::AID-JCD7>3.0.CO;2-Y","volume":"4","author":"D. L. Kreher","year":"1996","unstructured":"D. L. Kreher, Orthogonal arrays of strength 3, J. Combinat. Designs, Vol. 4 (1996) pp. 67-69.","journal-title":"J. Combinat. Designs"},{"key":"199816_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/0166-218X(83)90072-0","volume":"6","author":"S. Poljak","year":"1983","unstructured":"S. Poljak, A. Pultr, and V. R\u00f6dl, On qualitatively independent partitions and related problems, Discrete Applied Math., Vol. 6 (1983) pp. 193-205.","journal-title":"Discrete Applied Math."},{"key":"199816_CR11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1002\/jcd.3180010106","volume":"1","author":"N. J. A. Sloane","year":"1993","unstructured":"N. J. A. Sloane, Covering arrays and intersecting codes, J. Combinat. Designs, Vol. 1 (1993) pp. 51-63.","journal-title":"J. Combinat. Designs"},{"key":"199816_CR12","unstructured":"B. Stevens and E. Mendelsohn, New recursive methods for transversal covers, J. Combinat. Designs, to appear."},{"key":"199816_CR13","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1016\/0039-9140(96)01905-4","volume":"43","author":"A.-I. Tong","year":"1996","unstructured":"A.-I. Tong, Y.-G. Wu, and L.-D. Li, Room-temperature phosphorimetry studies of some addictive drugs following dansyl chloride labelling, Talanta, Vol. 43 (1996) pp. 1429-1436.","journal-title":"Talanta"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008379710317.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008379710317\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008379710317.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:14:38Z","timestamp":1753758878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008379710317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1999,5]]}},"alternative-id":["199816"],"URL":"https:\/\/doi.org\/10.1023\/a:1008379710317","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,5]]}}}