{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T11:01:23Z","timestamp":1695034883940},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T00:00:00Z","timestamp":1196294400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1007\/s10623-007-9130-1","type":"journal-article","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T11:18:38Z","timestamp":1196335118000},"page":"125-140","source":"Crossref","is-referenced-by-count":2,"title":["Undetected error probability of q-ary constant weight codes"],"prefix":"10.1007","volume":"48","author":[{"given":"Shu-Tao","family":"Xia","sequence":"first","affiliation":[]},{"given":"Fang-Wei","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,11,29]]},"reference":[{"key":"9130_CR1","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1109\/18.623147","volume":"43","author":"K.A.S. Abdel-Ghaffar","year":"1997","unstructured":"Abdel-Ghaffar K.A.S. (1997). A lower bound on the undetected error probability and strictly optimal codes. IEEE Trans. Inform. Theory 43, 1489\u20131502","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR2","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/18.748994","volume":"45","author":"A. Ashikhmin","year":"1999","unstructured":"Ashikhmin A., Barg A. (1999). Binomial moments of the distance distribution: bounds and applications. IEEE Trans. Inform. Theory 45, 438\u2013452","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR3","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1023\/A:1008382528138","volume":"16","author":"A. Barg","year":"1999","unstructured":"Barg A., Ashikhmin A. (1999). Binomial moments of the distance distribution and the probability of undetected error. Desi. Codes and Cryptogr. 16, 103\u2013116","journal-title":"Des. Codes and Cryptogr."},{"key":"9130_CR4","doi-asserted-by":"crossref","first-page":"2329","DOI":"10.1109\/18.841187","volume":"46","author":"M. Blaum","year":"2000","unstructured":"Blaum M., Bruck J. (2000). Coding for tolerance and detection of skew in parallel asynchronous communications. IEEE Trans. Inform. Theory 46, 2329\u20132335","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR5","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/18.30982","volume":"35","author":"F.R.K. Chung","year":"1989","unstructured":"Chung F.R.K., Salehi J.A., Wei V.K. (1989). Optical orthogonal codes: Design, analysis, and applications. IEEE Trans. Inform. Theory 35, 595\u2013604","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR6","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1023\/A:1026162531539","volume":"39","author":"R. Dodunekova","year":"2003","unstructured":"Dodunekova R. (2003). Extended binomial moments of a linear code and undetected error probability. Probl. Inform. Transmission 39, 255\u2013265","journal-title":"Probl. Inform. Transmission"},{"key":"9130_CR7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/0012-365X(95)00333-R","volume":"169","author":"T. Etzion","year":"1997","unstructured":"Etzion T. (1997). Optimal constant weight codes over Z k and generalized designs. Discrete Math. 169, 55\u201382","journal-title":"Discrete Math."},{"key":"9130_CR8","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/18.669415","volume":"44","author":"F.-W. Fu","year":"1998","unstructured":"Fu F.-W., Xia S.-T. (1998). Binary constant weight codes for error detection. IEEE Trans. Inform. Theory 44, 1294\u20131299","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR9","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1109\/TIT.2002.807299","volume":"49","author":"F.-W. Fu","year":"2003","unstructured":"Fu F.-W., Kl\u00f8ve T., Wei V.K. (2003). On the undetected error probability for binary codes. IEEE Trans. Inform. Theory 49, 382\u2013390","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR10","doi-asserted-by":"crossref","unstructured":"Fu F.-W., Kl\u00f8ve T., Xia S.-T.: On the undetected error probability of m-out-of-n codes on the binary symmetric channel. In: Buchmann J., H\u00f8holdt T., Stichtenoth H., Tapia-Recillas H. (eds.) Coding Theory, Cryptography, and Related Areas, pp. 102\u2013110, Springer (2000).","DOI":"10.1007\/978-3-642-57189-3_8"},{"key":"9130_CR11","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1109\/18.850701","volume":"46","author":"F.-W. Fu","year":"2000","unstructured":"Fu F.-W., Kl\u00f8ve T., Xia S.-T. (2000). The undetected error probability threshold of m-out-of-n codes. IEEE Trans. Inform. Theory 46, 1597\u20131599","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR12","doi-asserted-by":"crossref","first-page":"702","DOI":"10.4153\/CJM-1963-069-5","volume":"15","author":"H. Hanani","year":"1963","unstructured":"Hanani H. (1963). On some tactical configurations. Canad. J. Math. 15, 702\u2013722","journal-title":"Canad. J. Math."},{"key":"9130_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-2309-3","volume-title":"Error Detecting Codes: General Theory and Their Application in Feedback Communication Systems","author":"T. Kl\u00f8ve","year":"1995","unstructured":"Kl\u00f8ve T., Korzhik V. (1995). Error Detecting Codes: General Theory and Their Application in Feedback Communication Systems. Kluwer Acad. Press, Boston"},{"key":"9130_CR14","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1981","unstructured":"MacWilliams F.J., Sloane N.J.A. (1981). The Theory of Error-Correcting Codes. North-Holland, Amsterdam"},{"key":"9130_CR15","unstructured":"Mills W.H.: On the covering of triples by quadruple. In: Proceedings of the Fifth Southeastern Conference on Combinatorics, Graph Theory and Algorithms, pp. 573\u2013581 (1974)."},{"key":"9130_CR16","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1109\/12.677239","volume":"47","author":"L.G. Tallini","year":"1998","unstructured":"Tallini L.G., Bose B. (1998). Design of balanced and constant weight codes for VLSI systems. IEEE Trans. Comput. 47, 556\u2013572","journal-title":"IEEE Trans. Comput."},{"key":"9130_CR17","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0195-6698(85)80039-1","volume":"6","author":"H. Tarnanen","year":"1985","unstructured":"Tarnanen H., Aaltonen M., Goethals J-.M. (1985). On the nonbinary Johnson scheme. Eur. J. Combin. 6, 279\u2013285","journal-title":"Eur. J. Combin."},{"key":"9130_CR18","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.1109\/26.297847","volume":"42","author":"X.M. Wang","year":"1994","unstructured":"Wang X.M., Yang Y.X. (1994). On the undetected error probability of nonlinear binary constant weight codes. IEEE Trans. Commun. 42, 2390\u20132393","journal-title":"IEEE Trans. Commun."},{"key":"9130_CR19","doi-asserted-by":"crossref","first-page":"3364","DOI":"10.1109\/TIT.2005.853313","volume":"51","author":"S.-T. Xia","year":"2005","unstructured":"Xia S.-T., Fu F.-W., Jiang Y., Ling S. (2005). The probability of undetected error for binary constant weight codes. IEEE Trans. Inform. Theory 51, 3364\u20133373","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9130_CR20","doi-asserted-by":"crossref","first-page":"4235","DOI":"10.1109\/TIT.2006.880063","volume":"52","author":"S.-T. Xia","year":"2006","unstructured":"Xia S.-T., Fu F.-W., Ling S. (2006). A lower bound on the probability of undetected error for binary constant weight codes. IEEE Trans. Inform. Theory 52, 4235\u20134243","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9130-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9130-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9130-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:08Z","timestamp":1559245808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9130-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,29]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["9130"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9130-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11,29]]}}}