{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T01:50:41Z","timestamp":1673142641997},"reference-count":19,"publisher":"Open Publishing Association","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron. Proc. Theor. Comput. Sci.","EPTCS"],"DOI":"10.4204\/eptcs.252.9","type":"journal-article","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T12:51:54Z","timestamp":1503319914000},"page":"56-70","source":"Crossref","is-referenced-by-count":3,"title":["Dyck Words, Lattice Paths, and Abelian Borders"],"prefix":"10.4204","volume":"252","author":[{"given":"F.","family":"Blanchet-Sadri","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of North Carolina"}]},{"given":"Kun","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of North Carolina"}]},{"given":"Kenneth","family":"Hawes","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Virginia"}]}],"member":"2720","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"10.1051\/ita\/2011121","doi-asserted-by":"publisher","DOI":"10.1051\/ita\/2011121"},{"key":"10.1051\/ita\/2013034","doi-asserted-by":"publisher","DOI":"10.1051\/ita\/2013034"},{"key":"10.1089\/cmb.2004.11.1110","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2004.11.1110"},{"key":"10.1142\/S0129054112400175","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054112400175"},{"key":"10.1007\/s00224-011-9344-5","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-011-9344-5"},{"key":"10.1016\/j.ipl.2004.09.002","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.09.002"},{"key":"10.1016\/j.aam.2011.06.007","doi-asserted-by":"publisher","DOI":"10.1016\/j.aam.2011.06.007"},{"key":"10.1016\/j.dam.2014.02.012","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2014.02.012"},{"key":"10.1016\/j.ipl.2012.11.001","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2012.11.001"},{"key":"10.1016\/S0012-365X(98)00371-9","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(98)00371-9"},{"key":"10.1089\/cmb.2004.11.1050","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2004.11.1050"},{"key":"10.1016\/j.dam.2013.08.021","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2013.08.021"},{"key":"10.1006\/jcta.1996.0047","doi-asserted-by":"publisher","DOI":"10.1006\/jcta.1996.0047"},{"key":"10.1016\/0001-8708(85)90121-5","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8708(85)90121-5"},{"key":"10.4230\/LIPIcs.STACS.2013.245","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.STACS.2013.245"},{"key":"10.1016\/j.jat.2008.10.013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jat.2008.10.013"},{"key":"10.1112\/blms\/5.1.85","doi-asserted-by":"publisher","DOI":"10.1112\/blms\/5.1.85"},{"key":"10.1007\/11851561_35","doi-asserted-by":"publisher","DOI":"10.1007\/11851561_35"},{"key":"10.1007\/978-3-642-38771-5_37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38771-5_37"}],"container-title":["Electronic Proceedings in Theoretical Computer Science"],"original-title":[],"language":"en","deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T06:33:14Z","timestamp":1503469994000},"score":1,"resource":{"primary":{"URL":"http:\/\/arxiv.org\/abs\/1708.06461v1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":19,"URL":"http:\/\/dx.doi.org\/10.4204\/eptcs.252.9","relation":{},"ISSN":["2075-2180"],"issn-type":[{"value":"2075-2180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,21]]}}}