callback( { "result":{ "query":":facetid:toc:\"db/journals/dcc/dcc10.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"208.64" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"27", "@dc":"27", "@oc":"27", "@id":"43433607", "text":":facetid:toc:db/journals/dcc/dcc10.bht" } }, "hits":{ "@total":"27", "@computed":"27", "@sent":"27", "@first":"0", "hit":[{ "@score":"1", "@id":"6623773", "info":{"authors":{"author":[{"@pid":"42/2471","text":"R. Julian R. Abel"},{"@pid":"21/3607","text":"Charles J. Colbourn"},{"@pid":"53/2871","text":"Jianxing Yin"},{"@pid":"27/2116-1","text":"Hantao Zhang 0001"}]},"title":"Existence of Incomplete Transversal Designs with Block Size Five and Any Index lambda.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"275-307","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/AbelCYZ97","doi":"10.1023/A:1008232418845","ee":"https://doi.org/10.1023/A:1008232418845","url":"https://dblp.org/rec/journals/dcc/AbelCYZ97"}, "url":"URL#6623773" }, { "@score":"1", "@id":"6623775", "info":{"authors":{"author":[{"@pid":"79/3442","text":"Lynn Margaret Batten"},{"@pid":"c/KrisCoolsaet","text":"Kris Coolsaet"},{"@pid":"85/5669","text":"Anne Penfold Street"}]},"title":"Blocking Sets in (v, {2, 4}, 1)-Designs.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"309-314","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/BattenCS97","doi":"10.1023/A:1008291502915","ee":"https://doi.org/10.1023/A:1008291502915","url":"https://dblp.org/rec/journals/dcc/BattenCS97"}, "url":"URL#6623775" }, { "@score":"1", "@id":"6623776", "info":{"authors":{"author":[{"@pid":"28/6389","text":"Margaret Ann Bernard"},{"@pid":"39/1480","text":"Bhu Dev Sharma"}]},"title":"Linear Codes with Non-Uniform Error Correction Capability.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"315-323","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/BernardS97","doi":"10.1023/A:1008243619754","ee":"https://doi.org/10.1023/A:1008243619754","url":"https://dblp.org/rec/journals/dcc/BernardS97"}, "url":"URL#6623776" }, { "@score":"1", "@id":"6623781", "info":{"authors":{"author":[{"@pid":"55/2934","text":"Arrigo Bonisoli"},{"@pid":"59/5430","text":"Gábor Korchmáros"},{"@pid":"s/TamasSzonyi","text":"Tamás Szonyi"}]},"title":"Some Multiply Derived Translation Planes with SL(2, 5) as an Inherited Collineation Group in the Translation Complement.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"109-114","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/BonisoliKS97","doi":"10.1023/A:1008232117915","ee":"https://doi.org/10.1023/A:1008232117915","url":"https://dblp.org/rec/journals/dcc/BonisoliKS97"}, "url":"URL#6623781" }, { "@score":"1", "@id":"6623783", "info":{"authors":{"author":[{"@pid":"95/759","text":"Sabine Bouzette"},{"@pid":"07/4541","text":"Francis Buekenhout"},{"@pid":"33/2427","text":"Edmond Dony"},{"@pid":"24/5930","text":"Alain Gottcheiner"}]},"title":"A Theory of Nets for Polyhedra and Polytopes Related to Incidence Geometries.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"115-136","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/BouzetteBDG97","doi":"10.1023/A:1008284101986","ee":"https://doi.org/10.1023/A:1008284101986","url":"https://dblp.org/rec/journals/dcc/BouzetteBDG97"}, "url":"URL#6623783" }, { "@score":"1", "@id":"6623784", "info":{"authors":{"author":[{"@pid":"53/3492","text":"Claudia Broecker"},{"@pid":"29/3974","text":"Ralph-Hardo Schulz"},{"@pid":"97/4499","text":"Gernot Stroth"}]},"title":"Check Character Systems Using Chevalley Groups.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"137-143","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/BroeckerSS97","doi":"10.1023/A:1008236218824","ee":"https://doi.org/10.1023/A:1008236218824","url":"https://dblp.org/rec/journals/dcc/BroeckerSS97"}, "url":"URL#6623784" }, { "@score":"1", "@id":"6623786", "info":{"authors":{"author":[{"@pid":"37/3647","text":"Aiden A. Bruen"},{"@pid":"54/3960","text":"David L. Wehlau"}]},"title":"Partitioning Quadrics, Symmetric Group Divisible Designs and Caps.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"145-155","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/BruenW97","doi":"10.1023/A:1008288202894","ee":"https://doi.org/10.1023/A:1008288202894","url":"https://dblp.org/rec/journals/dcc/BruenW97"}, "url":"URL#6623786" }, { "@score":"1", "@id":"6623791", "info":{"authors":{"author":[{"@pid":"c/ARobertCalderbank","text":"A. Robert Calderbank"},{"@pid":"11/3568","text":"Gary McGuire"}]},"title":"Construction of a (64, 237, 12) Code via Galois Rings.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"157-165","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/CalderbankM97","doi":"10.1023/A:1008240319733","ee":"https://doi.org/10.1023/A:1008240319733","url":"https://dblp.org/rec/journals/dcc/CalderbankM97"}, "url":"URL#6623791" }, { "@score":"1", "@id":"6623792", "info":{"authors":{"author":{"@pid":"55/2477","text":"Stephen D. Cohen"}},"title":"The Length of Primitive BCH Codes with Minimal Covering Radius.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"5-16","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Cohen97","doi":"10.1023/A:1008299101833","ee":"https://doi.org/10.1023/A:1008299101833","url":"https://dblp.org/rec/journals/dcc/Cohen97"}, "url":"URL#6623792" }, { "@score":"1", "@id":"6623793", "info":{"authors":{"author":{"@pid":"21/5681","text":"Jean Conan"}},"title":"On the Enumeration and Generation of Nonweight Equivalent Rate ½ Convolutional Codes.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"17-27","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Conan97","doi":"10.1023/A:1008284118671","ee":"https://doi.org/10.1023/A:1008284118671","url":"https://dblp.org/rec/journals/dcc/Conan97"}, "url":"URL#6623793" }, { "@score":"1", "@id":"6623794", "info":{"authors":{"author":[{"@pid":"44/5476","text":"Robert S. Coulter"},{"@pid":"08/5031","text":"Rex W. Matthews"}]},"title":"Planar Functions and Planes of Lenz-Barlotti Class II.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"167-184","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/CoulterM97","doi":"10.1023/A:1008292303803","ee":"https://doi.org/10.1023/A:1008292303803","url":"https://dblp.org/rec/journals/dcc/CoulterM97"}, "url":"URL#6623794" }, { "@score":"1", "@id":"6623798", "info":{"authors":{"author":[{"@pid":"32/5679","text":"Diane Erdmann"},{"@pid":"91/5242","text":"Sean Murphy"}]},"title":"An Approximate Distribution for the Maximum Order Complexity.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"325-339","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/ErdmannM97","doi":"10.1023/A:1008295603824","ee":"https://doi.org/10.1023/A:1008295603824","url":"https://dblp.org/rec/journals/dcc/ErdmannM97"}, "url":"URL#6623798" }, { "@score":"1", "@id":"6623799", "info":{"authors":{"author":[{"@pid":"28/4112","text":"Marijn van Eupen"},{"@pid":"l/PetrLisonek","text":"Petr Lisonek"}]},"title":"Classification of Some Optimal Ternary Linear Codes of Small Length.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"63-84","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/EupenL97","doi":"10.1023/A:1008292320488","ee":"https://doi.org/10.1023/A:1008292320488","url":"https://dblp.org/rec/journals/dcc/EupenL97"}, "url":"URL#6623799" }, { "@score":"1", "@id":"6623800", "info":{"authors":{"author":[{"@pid":"19/4053","text":"Andreas Faldum"},{"@pid":"39/1606","text":"Wolfgang Willems"}]},"title":"Codes of Small Defect.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"341-350","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/FaldumW97","doi":"10.1023/A:1008247720662","ee":"https://doi.org/10.1023/A:1008247720662","url":"https://dblp.org/rec/journals/dcc/FaldumW97"}, "url":"URL#6623800" }, { "@score":"1", "@id":"6623802", "info":{"authors":{"author":[{"@pid":"75/930","text":"András Gács"},{"@pid":"81/269","text":"Péter Sziklai"},{"@pid":"s/TamasSzonyi","text":"Tamás Szonyi"}]},"title":"Two Remarks on Blocking Sets and Nuclei in Planes of Prime Order.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"29-39","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/GacsSS97","doi":"10.1023/A:1008236202741","ee":"https://doi.org/10.1023/A:1008236202741","url":"https://dblp.org/rec/journals/dcc/GacsSS97"}, "url":"URL#6623802" }, { "@score":"1", "@id":"6623806", "info":{"authors":{"author":{"@pid":"39/984","text":"Noboru Hamada"}},"title":"A Necessary and Sufficient Condition for the Existence of Some Ternary [n, k, d] Codes Meeting the Greismer Bound.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"41-56","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Hamada97","doi":"10.1023/A:1008288219580","ee":"https://doi.org/10.1023/A:1008288219580","url":"https://dblp.org/rec/journals/dcc/Hamada97"}, "url":"URL#6623806" }, { "@score":"1", "@id":"6623808", "info":{"authors":{"author":{"@pid":"21/4703","text":"Gerhard Hiss"}},"title":"On the Incidence Matrix of the Ree Unital.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"57-62","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Hiss97","doi":"10.1023/A:1008240303650","ee":"https://doi.org/10.1023/A:1008240303650","url":"https://dblp.org/rec/journals/dcc/Hiss97"}, "url":"URL#6623808" }, { "@score":"1", "@id":"6623810", "info":{"authors":{"author":{"@pid":"95/2513","text":"Alice E. D. Houston"}},"title":"On the Limit of Maximal Density of Sequences with a Perfect Linear Complexity Profile.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"351-359","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Houston97","doi":"10.1023/A:1008299704732","ee":"https://doi.org/10.1023/A:1008299704732","url":"https://dblp.org/rec/journals/dcc/Houston97"}, "url":"URL#6623810" }, { "@score":"1", "@id":"6623811", "info":{"authors":{"author":[{"@pid":"60/1443","text":"Wen-Ai Jackson"},{"@pid":"82/6740","text":"Peter R. Wild"}]},"title":"On GMW Designs and Cyclic Hadamard Designs.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"185-191","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/JacksonW97","doi":"10.1023/A:1008244420641","ee":"https://doi.org/10.1023/A:1008244420641","url":"https://dblp.org/rec/journals/dcc/JacksonW97"}, "url":"URL#6623811" }, { "@score":"1", "@id":"6623812", "info":{"authors":{"author":[{"@pid":"33/4629","text":"Norman L. Johnson"},{"@pid":"41/6800","text":"Guglielmo Lunardon"}]},"title":"Maximal Partial Spreads and Flocks.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"193-202","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/JohnsonL97","doi":"10.1023/A:1008296404711","ee":"https://doi.org/10.1023/A:1008296404711","url":"https://dblp.org/rec/journals/dcc/JohnsonL97"}, "url":"URL#6623812" }, { "@score":"1", "@id":"6623813", "info":{"authors":{"author":{"@pid":"10/2900","text":"Dieter Jungnickel"}},"title":"Special Issue #2 Dedicated to Hanfried Lenz - Preface.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"107","year":"1997","type":"Journal Articles","access":"unavailable","key":"journals/dcc/Jungnickel97","url":"https://dblp.org/rec/journals/dcc/Jungnickel97"}, "url":"URL#6623813" }, { "@score":"1", "@id":"6623821", "info":{"authors":{"author":[{"@pid":"44/6305","text":"Alan C. H. Ling"},{"@pid":"07/6928-2","text":"Xiaojun Zhu 0002"},{"@pid":"21/3607","text":"Charles J. Colbourn"},{"@pid":"93/4833","text":"Ronald C. Mullin"}]},"title":"Pairwise Balanced Designs with Consecutive Block Sizes.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"203-222","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/LingZCM97","doi":"10.1023/A:1008248521550","ee":"https://doi.org/10.1023/A:1008248521550","url":"https://dblp.org/rec/journals/dcc/LingZCM97"}, "url":"URL#6623821" }, { "@score":"1", "@id":"6623823", "info":{"authors":{"author":[{"@pid":"22/2043","text":"Siu Lun Ma"},{"@pid":"31/4889-1","text":"Bernhard Schmidt 0001"}]},"title":"Difference Sets Corresponding to a Class of Symmetric Designs.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"223-236","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/MaS97a","doi":"10.1023/A:1008200605620","ee":"https://doi.org/10.1023/A:1008200605620","url":"https://dblp.org/rec/journals/dcc/MaS97a"}, "url":"URL#6623823" }, { "@score":"1", "@id":"6623825", "info":{"authors":{"author":[{"@pid":"78/2666","text":"Rudolf Mathon"},{"@pid":"09/3537","text":"Tran van Trung"}]},"title":"Unitals and Unitary Polarities in Symmetric Designs.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"237-250","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/MathonT97","doi":"10.1023/A:1008252622458","ee":"https://doi.org/10.1023/A:1008252622458","url":"https://dblp.org/rec/journals/dcc/MathonT97"}, "url":"URL#6623825" }, { "@score":"1", "@id":"6623826", "info":{"authors":{"author":{"@pid":"35/6177","text":"Klaus Metsch"}},"title":"Embedding the Linear Structure of Planar Spaces into Projective Spaces.","venue":"Des. Codes Cryptogr.","volume":"10","number":"2","pages":"251-263","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Metsch97","doi":"10.1023/A:1008204706529","ee":"https://doi.org/10.1023/A:1008204706529","url":"https://dblp.org/rec/journals/dcc/Metsch97"}, "url":"URL#6623826" }, { "@score":"1", "@id":"6623834", "info":{"authors":{"author":{"@pid":"45/8211","text":"Zhe-Xian Wan"}},"title":"State Spaces of Convolutional Codes.","venue":"Des. Codes Cryptogr.","volume":"10","number":"3","pages":"361-369","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Wan97","doi":"10.1023/A:1008251821571","ee":"https://doi.org/10.1023/A:1008251821571","url":"https://dblp.org/rec/journals/dcc/Wan97"}, "url":"URL#6623834" }, { "@score":"1", "@id":"6623835", "info":{"authors":{"author":{"@pid":"22/5695","text":"A. J. van Zanten"}},"title":"Lexicographic Order and Linearity.","venue":"Des. Codes Cryptogr.","volume":"10","number":"1","pages":"85-97","year":"1997","type":"Journal Articles","access":"closed","key":"journals/dcc/Zanten97","doi":"10.1023/A:1008244404559","ee":"https://doi.org/10.1023/A:1008244404559","url":"https://dblp.org/rec/journals/dcc/Zanten97"}, "url":"URL#6623835" } ] } } } )