{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T10:46:38Z","timestamp":1772448398346,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1-3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s10623-010-9469-6","type":"journal-article","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T12:44:20Z","timestamp":1291725860000},"page":"119-130","source":"Crossref","is-referenced-by-count":10,"title":["Directed graph representation of half-rate additive codes over GF(4)"],"prefix":"10.1007","volume":"59","author":[{"given":"Lars Eirik","family":"Danielsen","sequence":"first","affiliation":[]},{"given":"Matthew G.","family":"Parker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,8]]},"reference":[{"issue":"3","key":"9469_CR1","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1109\/TIT.2008.2011447","volume":"55","author":"J. Bierbrauer","year":"2009","unstructured":"Bierbrauer J., Edel Y., Faina G., Marcugini S., Pambianco F.: Short additive quaternary codes. IEEE Trans. Inf. Theory 55(3), 952\u2013954 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"9469_CR2","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/S0195-6698(03)00096-9","volume":"25","author":"A. Blokhuis","year":"2004","unstructured":"Blokhuis A., Brouwer A.E.: Small additive quaternary codes. Eur. J. Combin. 25(2), 161\u2013167 (2004)","journal-title":"Eur. J. Combin."},{"issue":"1","key":"9469_CR3","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/0095-8956(88)90055-X","volume":"45","author":"A. Bouchet","year":"1988","unstructured":"Bouchet A.: Graphic presentations of isotropic systems. J. Combin. Theory Ser. B 45(1), 58\u201376 (1988)","journal-title":"J. Combin. Theory Ser. B"},{"issue":"4","key":"9469_CR4","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/18.681315","volume":"44","author":"A.R. Calderbank","year":"1998","unstructured":"Calderbank A.R., Rains E.M., Shor P.M., Sloane N.J.A.: Quantum error correction via codes over GF(4). IEEE Trans. Inf. Theory 44(4), 1369\u20131387 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9469_CR5","unstructured":"Cannon J., Bosma W.: Handbook of Magma Functions, Version 2.14. http:\/\/magma.maths.usyd.edu.au\/ (2007)."},{"issue":"1","key":"9469_CR6","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.ejc.2007.01.004","volume":"29","author":"Y. Choie","year":"2008","unstructured":"Choie Y., Sol\u00e9 P.: Brou\u00e9-Enguehard maps and Atkin-Lehner involutions. Eur. J. Combin. 29(1), 24\u201334 (2008)","journal-title":"Eur. J. Combin."},{"issue":"4","key":"9469_CR7","doi-asserted-by":"crossref","first-page":"329","DOI":"10.3934\/amc.2009.3.329","volume":"3","author":"L.E. Danielsen","year":"2009","unstructured":"Danielsen L.E.: Graph-based classification of self-dual additive codes over finite fields. Adv. Math. Commun. 3(4), 329\u2013348 (2009)","journal-title":"Adv. Math. Commun."},{"issue":"7","key":"9469_CR8","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1016\/j.jcta.2005.12.004","volume":"113","author":"L.E. Danielsen","year":"2006","unstructured":"Danielsen L.E., Parker M.G.: On the classification of all self-dual additive codes over GF(4) of length up to 12. J. Combin. Theory Ser. A 113(7), 1351\u20131367 (2006)","journal-title":"J. Combin. Theory Ser. A"},{"key":"9469_CR9","doi-asserted-by":"crossref","unstructured":"Gaborit P., Huffman W.C., Kim J.L., Pless V.: On additive GF(4) codes. In: Codes and Association Schemes. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 56, pp. 135\u2013149. American Mathematical Society, Providence, RI (2001)","DOI":"10.1090\/dimacs\/056\/12"},{"key":"9469_CR10","unstructured":"Grassl M., Klappenecker A., R\u00f6tteler M.: Graphs, quadratic forms, and quantum codes. In: Proceedings of IEEE International Symposium on Information Theory, p. 45 (2002)."},{"issue":"2","key":"9469_CR11","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TIT.2003.822616","volume":"50","author":"T.A. Gulliver","year":"2004","unstructured":"Gulliver T.A., Kim J.L.: Circulant based extremal additive self-dual codes over GF(4). IEEE Trans. Inform. Theory 50(2), 359\u2013366 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"9469_CR12","doi-asserted-by":"crossref","first-page":"1540","DOI":"10.1109\/TIT.2003.811929","volume":"49","author":"T.A. Gulliver","year":"2003","unstructured":"Gulliver T.A., \u00d6sterg\u00e5rd P.R.J., Senkevitch N.I.: Optimal quaternary linear rate-1\/2 codes of length \u2264\u00a018. IEEE Trans. Inform. Theory 49(6), 1540\u20131543 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"7","key":"9469_CR13","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1016\/j.jsc.2010.03.011","volume":"45","author":"S. Han","year":"2010","unstructured":"Han S., Kim J.L.: Formally self-dual additive codes over $${\\mathbb{F}_4}$$ . J. Sym. Comput. 45(7), 787\u2013799 (2010)","journal-title":"J. Sym. Comput."},{"issue":"1","key":"9469_CR14","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10623-008-9244-0","volume":"51","author":"S. Han","year":"2009","unstructured":"Han S., Kim J.L.: The nonexistence of near-extremal formally self-dual codes. Des. Codes Cryptogr. 51(1), 69\u201377 (2009)","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"9469_CR15","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1137\/S0895480102404367","volume":"16","author":"J.L. Kim","year":"2003","unstructured":"Kim J.L., Mellinger K.E., Pless V.: Projections of binary linear codes onto larger fields. SIAM J. Discret. Math. 16(4), 591\u2013603 (2003)","journal-title":"SIAM J. Discret. Math."},{"key":"9469_CR16","unstructured":"McKay B.D.: Nauty User\u2019s Guide, Version 2.2. http:\/\/cs.anu.edu.au\/~bdm\/nauty\/ (2004)."},{"issue":"3","key":"9469_CR17","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1023\/A:1019903407222","volume":"27","author":"P.R.J. \u00d6sterg\u00e5rd","year":"2002","unstructured":"\u00d6sterg\u00e5rd P.R.J.: Classifying subspaces of Hamming spaces. Des. Codes Cryptogr. 27(3), 297\u2013305 (2002)","journal-title":"Des. Codes Cryptogr."},{"key":"9469_CR18","volume-title":"Handbook of Coding Theory","year":"1998","unstructured":"Pless, V.S., Huffman, W.C. (eds): Handbook of Coding Theory. North-Holland, Amsterdam (1998)"},{"key":"9469_CR19","unstructured":"Rains E.M., Sloane N.J.A.: Self-dual codes. In: Handbook of Coding Theory, pp. 177\u2013294. North-Holland, Amsterdam (1998)."},{"issue":"1","key":"9469_CR20","doi-asserted-by":"crossref","first-page":"012308","DOI":"10.1103\/PhysRevA.65.012308","volume":"65","author":"D. Schlingemann","year":"2002","unstructured":"Schlingemann D., Werner R.F.: Quantum error-correcting codes associated with graphs. Phys. Rev. A 65(1), 012308 (2002)","journal-title":"Phys. Rev. A"},{"key":"9469_CR21","unstructured":"Sloane N.J.A.: The On-Line Encyclopedia of Integer Sequences. http:\/\/www.research.att.com\/~njas\/sequences\/ (2010)."},{"key":"9469_CR22","volume-title":"The Encyclopedia of Integer Sequences","author":"N.J.A. Sloane","year":"1995","unstructured":"Sloane N.J.A., Plouffe S.: The Encyclopedia of Integer Sequences. Academic Press, San Diego, CA (1995)"},{"issue":"2","key":"9469_CR23","doi-asserted-by":"crossref","first-page":"022316","DOI":"10.1103\/PhysRevA.69.022316","volume":"69","author":"M. Vanden Nest","year":"2004","unstructured":"Vanden Nest M., Dehaene J., De Moor B.: Graphical description of the action of local Clifford transformations on graph states. Phys. Rev. A 69(2), 022316 (2004)","journal-title":"Phys. Rev. A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s10623-010-9469-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T21:45:57Z","timestamp":1559857557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9469-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,8]]},"references-count":23,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["9469"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9469-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,8]]}}}