{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:35:27Z","timestamp":1774020927432,"version":"3.50.1"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T00:00:00Z","timestamp":1462924800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["339109"],"award-info":[{"award-number":["339109"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["339109"],"award-info":[{"award-number":["339109"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["339109"],"award-info":[{"award-number":["339109"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s10623-016-0216-5","type":"journal-article","created":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T00:37:41Z","timestamp":1462927061000},"page":"87-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Semidefinite bounds for nonbinary codes based on quadruples"],"prefix":"10.1007","volume":"84","author":[{"given":"Bart","family":"Litjens","sequence":"first","affiliation":[]},{"given":"Sven","family":"Polak","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Schrijver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"key":"216_CR1","unstructured":"Bogdanova G.T., Brouwer A.E., Kapralov S.N., \u00d6sterg\u00e5rd P.R.J.: Error-correcting codes over an alphabet of four elements. Discret. Comput. Geom. 23, 333\u2013342 (2001)."},{"key":"216_CR2","doi-asserted-by":"crossref","unstructured":"Bogdanova G.T., \u00d6sterg\u00e5rd P.R.J.: Bounds on codes over an alphabet of five elements. Discret. Math. 240, 13\u201319 (2001).","DOI":"10.1016\/S0012-365X(00)00383-6"},{"key":"216_CR3","unstructured":"Brouwer A.E.: Tables of code bounds, see http:\/\/www.win.tue.nl\/~aeb\/ (2015)."},{"key":"216_CR4","unstructured":"Delsarte P.: An algebraic approach to the association schemes of coding theory. Philips Research Reports Supplements 1973 No. 10, Philips Research Laboratories, Eindhoven (1973)."},{"key":"216_CR5","unstructured":"Gijswijt D.: Block diagonalization for algebra\u2019s associated with block codes. arXiv:0910.4515 (2014)."},{"key":"216_CR6","doi-asserted-by":"crossref","unstructured":"Gijswijt D.C., Mittelmann H.D., Schrijver A.: Semidefinite code bounds based on quadruple distances. IEEE Trans. Inf. Theory 58, 2697\u20132705 (2012).","DOI":"10.1109\/TIT.2012.2184845"},{"key":"216_CR7","doi-asserted-by":"crossref","unstructured":"Gijswijt D., Schrijver A., Tanaka H.: New upper bounds for nonbinary codes based on the Terwilliger algebra and semidefinite programming. J. Comb. Theory A 113, 1719\u20131731 (2006).","DOI":"10.1016\/j.jcta.2006.03.010"},{"key":"216_CR8","doi-asserted-by":"crossref","unstructured":"Sagan B.E.: The Symmetric Group: Representations, Combinatorial Algorithms, and Symmetric Functions, Graduate Texts in Mathematics, vol. 203. Springer, New York (2001).","DOI":"10.1007\/978-1-4757-6804-6"},{"key":"216_CR9","doi-asserted-by":"crossref","unstructured":"Schrijver A.: New code upper bounds from the Terwilliger algebra and semidefinite programming. IEEE Trans. Inf. Theory 51, 2859\u20132866 (2005).","DOI":"10.1109\/TIT.2005.851748"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0216-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0216-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0216-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0216-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T10:12:22Z","timestamp":1567851142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0216-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,11]]},"references-count":9,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["216"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0216-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,11]]}}}