{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:06:35Z","timestamp":1754161595233,"version":"3.41.2"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[1996,5,1]],"date-time":"1996-05-01T00:00:00Z","timestamp":830908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1996,5,1]],"date-time":"1996-05-01T00:00:00Z","timestamp":830908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1996,5]]},"DOI":"10.1023\/a:1018028824093","type":"journal-article","created":{"date-parts":[[2003,11,10]],"date-time":"2003-11-10T14:23:58Z","timestamp":1068474238000},"page":"103-108","source":"Crossref","is-referenced-by-count":0,"title":["5-Cycle Systems with Holes"],"prefix":"10.1007","volume":"8","author":[{"given":"Darryn E.","family":"Bryant","sequence":"first","affiliation":[]},{"given":"D. G.","family":"Hoffman","sequence":"additional","affiliation":[]},{"given":"C. A.","family":"Rodger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"110877_CR1","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1002\/jcd.3180020405","volume":"2","author":"D. E. Bryant","year":"1994","unstructured":"D. E. Bryant and C. A. Rodger, On the Doyen-Wilson Theorem for m-cycle systems, J. Combin. Designs, Vol. 2 (1994) pp. 253\u2013271.","journal-title":"J. Combin. Designs"},{"key":"110877_CR2","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/0097-3165(94)90101-5","volume":"68","author":"D. E. Bryant","year":"1994","unstructured":"D. E. Bryant and C. A. Rodger, The Doyen-Wilson Theorem extended to 5-cycles, J. Combin. Theory Ser. A, Vol. 68 (1994) pp. 218\u2013224.","journal-title":"J. Combin. Theory Ser. A"},{"key":"110877_CR3","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0012-365X(73)90139-8","volume":"5","author":"J. Doyen","year":"1973","unstructured":"J. Doyen and R. M. Wilson, Embeddings of Steiner triple systems, Discrete Math, Vol. 5 (1973) pp. 229\u2013239.","journal-title":"Discrete Math"},{"key":"110877_CR4","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1002\/jgt.3190160207","volume":"16","author":"D. G. Hoffman","year":"1992","unstructured":"D. G. Hoffman and C. A. Rodger, The chromatic index of complete multipartite graphs, J. Graph Theory, Vol. 16 (1992) pp. 159\u2013163.","journal-title":"J. Graph Theory"},{"key":"110877_CR5","first-page":"5","volume":"61","author":"C. A. Rodger","year":"1988","unstructured":"C. A. Rodger, Problems on cycle systems of odd length, Cong. Numer., Vol. 61 (1988) pp. 5\u201322.","journal-title":"Cong. Numer."},{"key":"110877_CR6","first-page":"235","volume":"40","author":"E. Mendelsohn","year":"1983","unstructured":"E. Mendelsohn and A. Rosa, Embedding maximum packings of triples, Cong. Numer., Vol. 40 (1983) pp. 235\u2013247.","journal-title":"Cong. Numer."},{"key":"110877_CR7","first-page":"109","volume":"17","author":"G. Stern","year":"1980","unstructured":"G. Stern and A. Lenz, Steiner triple systems with given subspaces; another proof of the Doyen-Wilson theorem, Boll. Un. Mat. Ital. A (5), Vol. 17 (1980) pp. 109\u2013114.","journal-title":"Boll. Un. Mat. Ital. A (5)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018028824093.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1018028824093\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018028824093.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:57:27Z","timestamp":1753761447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1018028824093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,5]]},"references-count":7,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1996,5]]}},"alternative-id":["110877"],"URL":"https:\/\/doi.org\/10.1023\/a:1018028824093","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1996,5]]}}}