{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T21:07:56Z","timestamp":1769980076711,"version":"3.49.0"},"reference-count":24,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2005,1]]},"DOI":"10.1137\/s0097539703435753","type":"journal-article","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T01:00:17Z","timestamp":1129597217000},"page":"247-257","source":"Crossref","is-referenced-by-count":36,"title":["Approximating <i>k<\/i>-node Connected Subgraphs via Critical Graphs"],"prefix":"10.1137","volume":"35","author":[{"given":"Guy","family":"Kortsarz","sequence":"first","affiliation":[]},{"given":"Zeev","family":"Nutov","sequence":"additional","affiliation":[]}],"member":"351","reference":[{"key":"R1","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1999.1006"},{"key":"R2","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-001-0017-7"},{"key":"R3","doi-asserted-by":"publisher","DOI":"10.1137\/S009753979833920X"},{"key":"R4","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701392287"},{"key":"R6","doi-asserted-by":"publisher","DOI":"10.1007\/s101070050040"},{"key":"R7","doi-asserted-by":"publisher","DOI":"10.1006\/jctb.1995.1044"},{"key":"R8","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(89)90469-2"},{"key":"R10","volume-title":"Handbook of combinatorics. Vol. 1","author":"Graham R.","year":"1995"},{"key":"R11","doi-asserted-by":"publisher","DOI":"10.1006\/jctb.1995.1002"},{"key":"R12","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(97)00100-3"},{"key":"R14","doi-asserted-by":"publisher","DOI":"10.1007\/s004930170004"},{"key":"R15","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702416736"},{"key":"R16","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1027-4"},{"key":"R17","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1996.0052"},{"key":"R18","doi-asserted-by":"publisher","DOI":"10.1007\/s003730200008"},{"key":"R19","doi-asserted-by":"publisher","DOI":"10.1007\/BF01304873"},{"key":"R20","doi-asserted-by":"publisher","DOI":"10.1016\/0095-8956(85)90076-0"},{"key":"R21","doi-asserted-by":"publisher","DOI":"10.1007\/BF01351600"},{"key":"R22","doi-asserted-by":"publisher","DOI":"10.1006\/jctb.2002.2129"},{"key":"R23","doi-asserted-by":"publisher","DOI":"10.1007\/s00493-004-0027-6"},{"key":"R26","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(77)90065-6"},{"key":"R28","doi-asserted-by":"publisher","DOI":"10.1007\/BF02523686"},{"key":"R29","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-002-0970-9"},{"key":"R30","first-page":"1675","volume":"33","author":"Su Jian","year":"1988","journal-title":"Kexue Tongbao (English Ed.)"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/S0097539703435753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,29]],"date-time":"2017-01-29T16:44:31Z","timestamp":1485708271000},"score":1,"resource":{"primary":{"URL":"http:\/\/epubs.siam.org\/doi\/10.1137\/S0097539703435753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["10.1137\/S0097539703435753"],"URL":"https:\/\/doi.org\/10.1137\/s0097539703435753","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,1]]}}}