{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:23:09Z","timestamp":1725974589388},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811300226"},{"type":"electronic","value":"9789811300233"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0023-3_4","type":"book-chapter","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T07:16:31Z","timestamp":1523603791000},"page":"36-41","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Repeated Burst Error Correcting Linear Codes Over GF(q); q\u00a0=\u00a03"],"prefix":"10.1007","author":[{"given":"Vinod","family":"Tyagi","sequence":"first","affiliation":[]},{"given":"Subodh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,14]]},"reference":[{"issue":"4","key":"4_CR1","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/TIT.1959.1057524","volume":"IT-5","author":"NM Abramson","year":"1959","unstructured":"Abramson, N.M.: A class of systemic codes for non independent errors. IRE Trans. Inf. Theor. IT-5(4), 150\u2013157 (1959)","journal-title":"IRE Trans. Inf. Theor."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1002\/j.1538-7305.1970.tb01806.x","volume":"99","author":"JD Bridwell","year":"1970","unstructured":"Bridwell, J.D., Wolf, J.K.: Burst distance and multiple burst correction. Bell Syst. Tech. J. 99, 889\u2013909 (1970)","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1147\/rd.94.0292","volume":"9","author":"RT Chien","year":"1965","unstructured":"Chien, R.T., Tang, D.T.: Definition of a burst. IBM J. Res. Dev. 9(4), 292\u2013293 (1965)","journal-title":"IBM J. Res. Dev."},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1250043","DOI":"10.1142\/S1793830912500437","volume":"4","author":"BK Dass","year":"2012","unstructured":"Dass, B.K., Verma, R.: Construction of m-repeated bursts error correcting binary linear code. Discret. Math. Algorithms Appl. 4(3), 1250043 (2012). (7 p.)","journal-title":"Discret. Math. Algorithms Appl."},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1142\/S1793557108000278","volume":"1","author":"BK Dass","year":"2008","unstructured":"Dass, B.K., Verma, R.: Repeated burst error correcting linear codes. Asian Eur. J. Math. 1(3), 303\u2013335 (2008)","journal-title":"Asian Eur. J. Math."},{"key":"4_CR6","unstructured":"Fire, P.: A class of multiple error correcting binary Codes for non independent errors, Sylvania report RSL- E-2. Sylvania Reconnaissance Systems Laboratory, Mountain View (1959)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29, 147\u2013160 (1950)","journal-title":"Bell Syst. Tech. J."},{"key":"4_CR8","volume-title":"Error Correcting Codes","author":"WW Peterson","year":"1972","unstructured":"Peterson, W.W., Weldon Jr., E.J.: Error Correcting Codes, 2nd edn. The MIT Press, Mass (1972)","edition":"2"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1137\/0113076","volume":"13","author":"EC Posner","year":"1965","unstructured":"Posner, E.C.: Simultaneous error correction and burst error detecting using binary linear cyclic codes. J. Soc. Ind. Appl. Math. 13(4), 1087\u20131095 (1965)","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"3276","DOI":"10.1111\/j.1460-9568.2007.05559.x","volume":"25","author":"KV Srinivas","year":"2007","unstructured":"Srinivas, K.V., Jain, R., Saurav, S., Sikdar, S.K.: Small-world network topology of hippocampal neuronal network is lost in an in vitro glutamate injury model of epilosy. Eur. Neurosci. 25, 3276\u20133280 (2007)","journal-title":"Eur. Neurosci."},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TIT.1965.1053771","volume":"IT-11","author":"JK Wolf","year":"1965","unstructured":"Wolf, J.K.: On codes derivable from the tensor product of matrices. IEEE Trans. Inf. Theor. IT-11(2), 281\u2013284 (1965)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TIT.1963.1057819","volume":"9","author":"AD Wyner","year":"1963","unstructured":"Wyner, A.D.: Low-density-burst-correcting codes. IEEE Trans. Inf. Theor. 9, 124 (1963)","journal-title":"IEEE Trans. Inf. Theor."}],"container-title":["Communications in Computer and Information Science","Mathematics and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0023-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T07:16:59Z","timestamp":1523603819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0023-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811300226","9789811300233"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0023-3_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}