{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:55:07Z","timestamp":1729619707528,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/itw.2012.6404678","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:30:12Z","timestamp":1358454612000},"page":"292-296","source":"Crossref","is-referenced-by-count":17,"title":["Sequential group testing with graph constraints"],"prefix":"10.1109","author":[{"given":"Amin","family":"Karbasi","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Zadimoghaddam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"7","article-title":"Bound of the length of disjunct codes","volume":"18","author":"dyachkov","year":"1982","journal-title":"Problems of Information Transmission"},{"key":"17","article-title":"Distributed sensor failure detection in sensor networks","author":"tosic","year":"2011","journal-title":"CoRR"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034280"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935018"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2068057"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.87"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2169535"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1081\/STA-100106070"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000422"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(82)90004-8"},{"key":"20","first-page":"1","article-title":"A survey of superimposed code theory","volume":"12","author":"dyachkov","year":"1983","journal-title":"Problem of Control and Information Theory"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02772959"},{"key":"23","first-page":"257","article-title":"Non-adaptive hypergeometric group testing","volume":"22","author":"hwang","year":"1985","journal-title":"Studia Scient Math"},{"key":"24","first-page":"7","article-title":"Bounds for the length of disjunctive codes","author":"dyachkov","year":"1982","journal-title":"Problems of Information Transmission"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1972.10481257"},{"key":"26","first-page":"81","article-title":"Generalized framework for selectors with applications in optimal group testing","author":"bonis","year":"2003","journal-title":"ICALP"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548304006649"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539703428002"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2103752"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CSB.2003.1227307"},{"key":"2","first-page":"171","article-title":"A survey on combinatorial group testing algorithms with applications to DNA library screening","volume":"55","author":"ngo","year":"2000","journal-title":"DIMACS"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1142\/6122","article-title":"Pooling designs and nonadaptive group testing","author":"du","year":"2006","journal-title":"World Scientific Series on Applied Mathematics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731363"},{"key":"7","first-page":"100","article-title":"Pairwise testing","volume":"78","author":"blass","year":"2002","journal-title":"Bulletin of the European Association for Theoretical Computer Science"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2007.0195"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009732820981"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/BF01609876"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061325"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75520-3_15"}],"event":{"name":"2012 IEEE Information Theory Workshop (ITW 2012)","start":{"date-parts":[[2012,9,3]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2012,9,7]]}},"container-title":["2012 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389798\/6404631\/06404678.pdf?arnumber=6404678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T12:31:08Z","timestamp":1562589068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/itw.2012.6404678","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}