{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:46:46Z","timestamp":1725493606004},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430261"},{"type":"electronic","value":"9783540453253"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45325-3_26","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T07:51:25Z","timestamp":1193471485000},"page":"301-306","source":"Crossref","is-referenced-by-count":2,"title":["Investigation of Linear Codes Possessing Some Extra Properties"],"prefix":"10.1007","author":[{"given":"Viktoriya","family":"Masol","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,4]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/0097-3165(72)90017-9","volume":"13","author":"D.C. Kurts","year":"1972","unstructured":"Kurts, D.C.: A Note on Concavity Properties of Triangular Arrays of Numbers. J. Comb. Theory, Vol. 13 (1972) 135\u2013139","journal-title":"J. Comb. Theory"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/S0021-9800(68)80057-2","volume":"5","author":"E.H. Lieb","year":"1968","unstructured":"Lieb, E.H.: Concavity Properties and a Generating Function for Stirling Numbers. J. Comb. Theory, Vol. 5 (1968) 203\u2013206","journal-title":"J. Comb. Theory"},{"key":"26_CR3","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes (1977)"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/BF02308820","volume":"59","author":"V.I. Masol","year":"1996","unstructured":"Masol, V.I.: Asymptotic Behaviour of the Number of Certain k-dimantional Subspaces over a Finite Field. Mathematical Notes, Vol. 59 (1996) 525\u2013530","journal-title":"Mathematical Notes"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45325-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T16:05:36Z","timestamp":1551024336000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45325-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430261","9783540453253"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-45325-3_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}