{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T06:38:34Z","timestamp":1756190314441},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T00:00:00Z","timestamp":1182902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2007,9,5]]},"DOI":"10.1007\/s10623-007-9081-6","type":"journal-article","created":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T08:52:31Z","timestamp":1182934351000},"page":"51-64","source":"Crossref","is-referenced-by-count":1,"title":["G-projectable and \u039b-projectable binary linear block codes"],"prefix":"10.1007","volume":"45","author":[{"given":"Morteza","family":"Esmaeili","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Hivadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,6,27]]},"reference":[{"key":"9081_CR1","doi-asserted-by":"crossref","first-page":"2560","DOI":"10.1109\/18.945270","volume":"47","author":"O Amrani","year":"2001","unstructured":"Amrani O and Be\u2019ery Y (2001). Reed-Muller codes: Projections on GF(4) and multilevel construction. IEEE Trans Inform Theory 47: 2560\u20132565","journal-title":"IEEE Trans Inform Theory"},{"key":"9081_CR2","unstructured":"Brouwer AE Linear code bound. http:\/\/www.win.tue.nl\/aeb\/voorlincod.html."},{"key":"9081_CR3","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1109\/TIT.2003.811930","volume":"49","author":"M Esmaeili","year":"2003","unstructured":"Esmaeili M, Gulliver TA and Khandani AK (2003). On the Pless construction and ML Decoding of the (48,24,12) quadratic residue code. IEEE Trans Inform Theory 49: 1527\u20131535","journal-title":"IEEE Trans Inform Theory"},{"key":"9081_CR4","unstructured":"Esmaeili M, Gulliver TA On the quaternary projection of binary linear block codes. ARS Combinatoria, Vol.~85, October~2007"},{"key":"9081_CR5","doi-asserted-by":"crossref","unstructured":"Gaborit P, Huffman WC, Kim J-L, Pless V (2001) On additive GF(4) codes. In: proceedings of the DIMACS workshop on codes and association schemes, DIMACS Ser. Discrete Math. Theoret. Comput. Sci. 56, AMS Providence, RI, pp 135\u2013149","DOI":"10.1090\/dimacs\/056\/12"},{"key":"9081_CR6","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/S0012-365X(02)00550-2","volume":"264","author":"P Gaborit","year":"2003","unstructured":"Gaborit P, Kim J-L and Pless V (2003). Decoding binary R(2,5) by hand. Discrete Math 264: 55\u201373","journal-title":"Discrete Math"},{"key":"9081_CR7","unstructured":"Kim J-L, Pless V (2002) Decoding some doubly-even self-dual [32,16,8] codes by hand. In: proceedings of a conference honouring Professor Dijen Ray-Chaudhuri on the occasion of his 65th birthday, Ohio State Univ. Math. Res. Inst. Publ. 10, Ohio State University, Columbus, OH, pp 165\u2013178"},{"issue":"4","key":"9081_CR8","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1137\/S0895480102404367","volume":"16","author":"J-L Kim","year":"2003","unstructured":"Kim J-L, Mellinger KE and Pless V (2003). Projections of binary linear codes onto larger fields. SIAM J Discrete Math 16(4): 591\u2013603","journal-title":"SIAM J Discrete Math"},{"key":"9081_CR9","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TIT.1986.1057197","volume":"32","author":"V Pless","year":"1986","unstructured":"Pless V (1986). Decoding the Golay codes. IEEE Trans Inform Theory 32: 561\u2013566","journal-title":"IEEE Trans Inform Theory"},{"key":"9081_CR10","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1109\/18.79928","volume":"37","author":"A Vardy","year":"1991","unstructured":"Vardy A and Be\u2019ery Y (1991). More efficient soft decoding of the Golay codes. IEEE Trans Inform Theory 37: 667\u2013672","journal-title":"IEEE Trans Inform Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9081-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9081-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9081-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:08Z","timestamp":1559245808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9081-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,27]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,9,5]]}},"alternative-id":["9081"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9081-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,6,27]]}}}