{"id":8273,"date":"2008-02-08T10:50:00","date_gmt":"2008-02-08T10:50:00","guid":{"rendered":"http:\/\/cio.edu.umh.es\/?p=8273"},"modified":"2008-02-08T10:50:00","modified_gmt":"2008-02-08T10:50:00","slug":"amigo-j-m-elizalde-s-kennel-m-b-2008-forbidden-patterns-and-shift-systems-journal-of-combinatorial-theory-series-a-vol-115-pp-485-504","status":"publish","type":"post","link":"https:\/\/cio.umh.es\/en\/2008\/02\/08\/amigo-j-m-elizalde-s-kennel-m-b-2008-forbidden-patterns-and-shift-systems-journal-of-combinatorial-theory-series-a-vol-115-pp-485-504\/","title":{"rendered":"Amig\u00f3, J.M., Elizalde, S., Kennel, M.B., (2008) \u201cForbidden patterns and shift systems\u201d, Journal of Combinatorial Theory Series A,  115 (3) : 485-504"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":5675,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[75,7834],"tags":[372931],"_links":{"self":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts\/8273"}],"collection":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/users\/5675"}],"replies":[{"embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/comments?post=8273"}],"version-history":[{"count":0,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts\/8273\/revisions"}],"wp:attachment":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/media?parent=8273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/categories?post=8273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/tags?post=8273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}