{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T21:10:05Z","timestamp":1722028205162},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T00:00:00Z","timestamp":1372204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s10623-013-9846-z","type":"journal-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T08:01:09Z","timestamp":1372147269000},"page":"15-29","source":"Crossref","is-referenced-by-count":2,"title":["Two series of equitable symbol weight codes meeting the Plotkin bound"],"prefix":"10.1007","volume":"74","author":[{"given":"Peipei","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jianmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianxing","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,26]]},"reference":[{"key":"9846_CR1","doi-asserted-by":"crossref","unstructured":"Beth T., Jungnickel D., Lenz H.: Design Theory. Cambridge University Press, Cambridge (1999).","DOI":"10.1017\/CBO9780511549533"},{"key":"9846_CR2","doi-asserted-by":"crossref","unstructured":"Blake I.F., Mullin R.C.: An Introduction to Algebraic and Combinatorial Coding Theory. Academic Press, New York (1976).","DOI":"10.1016\/B978-0-12-103560-0.50008-X"},{"key":"9846_CR3","unstructured":"Bogdanova G., Todorov T., Zinoviev V.A.: On construction of $$q$$ q -ary equidistant codes. Probl. Inf. Transm. 43, 13\u201336 (2007)."},{"key":"9846_CR4","unstructured":"Chee Y.M., Kiah H., Ling A., Wang C.: Optimal equitable symbol weight codes for power line communications. In: ISIT 2012\u2014Proceedings of the 2012 IEEE International Symposium on Information Theory, Cambridge, pp. 671\u2013675 (2012)."},{"key":"9846_CR5","unstructured":"Chee Y.M., Kiah H., Purkayastha P., Wang C.: Importance of symbol equity in coded modulation for power line communications. In: ISIT 2012\u2014Proceedings of the 2012 IEEE International Symposium on Information Theory, Cambridge, pp. 666\u2013670 (2012)."},{"key":"9846_CR6","unstructured":"Chee Y.M., Kiah H., Wang C.: Generalized balanced tournament designs with block size four, Preprint."},{"key":"9846_CR7","doi-asserted-by":"crossref","unstructured":"Colbourn C.J., Dinitz J.H.: The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (2007).","DOI":"10.1201\/9781420010541"},{"key":"9846_CR8","doi-asserted-by":"crossref","unstructured":"Colbourn C.J., Lamken E.R., Ling A.C.H., Mills W.H.: The existence of Kirkman squares-doubly resolvable $$(v, 3, 1)$$ ( v , 3 , 1 ) -BIBDs. Des. Codes Cryptogr. 26, 169\u2013196 (2002).","DOI":"10.1023\/A:1016513527747"},{"key":"9846_CR9","unstructured":"Furino S.C., Miao Y., Yin J.: Frames and Resolvable Designs. CRC Press, Boca Raton (1996)."},{"key":"9846_CR10","doi-asserted-by":"crossref","unstructured":"Lamken E.R.: Generalized balanced tournament designs. Trans. Am. Math. Soc. 318, 473\u2013490 (1990).","DOI":"10.1090\/S0002-9947-1990-0978380-6"},{"key":"9846_CR11","doi-asserted-by":"crossref","unstructured":"Lamken E.R.: Existence results for generalized balanced tournament designs with block size 3. Des. Codes Cryptogr. 3, 33\u201361 (1992).","DOI":"10.1007\/BF01389354"},{"key":"9846_CR12","unstructured":"Lamken E.R.: Constructions for generalized balanced tournament designs. Discret. Math. 131, 127\u2013151 (1994)."},{"key":"9846_CR13","unstructured":"Rosa A., Vanstone S.A.: Starter\u2013adder techniques for Kirkman squares and Kirkman cubes of small sides. Ars Combin. 14, 199\u2013212 (1982)."},{"key":"9846_CR14","unstructured":"Schellenberg P.J., Van Rees G.H.J., Vanstone S.A.: The existence of balanced tournament designs. Ars Combin. 3, 303\u2013318 (1977)."},{"key":"9846_CR15","unstructured":"Semakov N.V., Zinoviev V.A.: Equidistant $$q$$ q -ary codes with maximal distance and resolvable balanced incomplete block designs. Probl. Peredachi Inf. 4(2), 3\u201310 (1968). [Probl. Inf. Trans. (Engl. Transl.) 4(2), 1\u20137 (1968).]"},{"key":"9846_CR16","unstructured":"Semakov N.V., Zaitsev G.V., Zinoviev V.A.: A class of maximal equidistant codes. Probl. Peredachi Inf. 5(2), 84\u201387 (1969). [Probl. Inf. Trans. (Engl. Transl.) 5(2), 65\u201368 (1969).]"},{"key":"9846_CR17","unstructured":"Shan X.: Near generalized balanced tournament designs with block sizes 4 and 5. Sci. China Ser. A. 50, 1382\u20131388 (2007)."},{"key":"9846_CR18","doi-asserted-by":"crossref","unstructured":"Stanton R.G., Mullin R.C.: Construction of room squares. Ann. Math. Stat. 39, 1540\u20131548 (1968).","DOI":"10.1214\/aoms\/1177698135"},{"key":"9846_CR19","unstructured":"Yan J., Wang C.: The existence of FGDRP $$(3, g^u)$$ ( 3 , g u ) \u2019s. Electron. J. Comb. 16, 1 (2009)."},{"key":"9846_CR20","unstructured":"Yan J., Wang C.: The existence of near generalized balanced tournament designs. Electron. J. Comb. 19, 2 (2012)."},{"key":"9846_CR21","unstructured":"Yan J., Yin J.: Constructions of optimal GDRP $$(n,\\lambda ; v)$$ ( n , \u03bb ; v ) \u2019s of type $$\\lambda ^1\\mu ^{m-1}$$ \u03bb 1 \u03bc m - 1 . Discret. Appl. Math. 156, 2666\u20132678 (2008)."},{"key":"9846_CR22","doi-asserted-by":"crossref","unstructured":"Yan J., Yin J.: A class of optimal constant composition codes from GDRPs. Des. Codes Cryptogr. 50, 61\u201376 (2009).","DOI":"10.1007\/s10623-008-9214-6"},{"key":"9846_CR23","doi-asserted-by":"crossref","unstructured":"Yin J., Yan J., Wang C.: Generalized balanced tournament designs and related codes. Des. Codes Cryptogr. 46, 211\u2013230 (2008).","DOI":"10.1007\/s10623-007-9154-6"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9846-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9846-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9846-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T05:56:19Z","timestamp":1563256579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9846-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,26]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["9846"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9846-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,26]]}}}