{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T11:43:18Z","timestamp":1778586198385,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:00:00Z","timestamp":1619308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:00:00Z","timestamp":1619308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100005376","name":"American Mathematical Society","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005376","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013395","name":"Sistema Nacional de Investigadores","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013395","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10623-021-00872-w","type":"journal-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T15:02:16Z","timestamp":1619362936000},"page":"1367-1403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["The dual of an evaluation code"],"prefix":"10.1007","volume":"89","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9832-7145","authenticated-orcid":false,"given":"Hiram H.","family":"L\u00f3pez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivan","family":"Soprunov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rafael H.","family":"Villarreal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,4,25]]},"reference":[{"key":"872_CR1","volume-title":"Gr\u00f6bner bases A Computational Approach to Commutative Algebra, in cooperation with Heinz Kredel, Graduate Texts in Mathematics 141","author":"T Becker","year":"1993","unstructured":"Becker T., Weispfenning V.: Gr\u00f6bner bases A Computational Approach to Commutative Algebra, in cooperation with Heinz Kredel, Graduate Texts in Mathematics 141. Springer, New York (1993)."},{"key":"872_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ffa.2018.01.006","volume":"51","author":"P Beelen","year":"2018","unstructured":"Beelen P., Datta M.: Generalized Hamming weights of affine Cartesian codes. Finite Fields Appl. 51, 130\u2013145 (2018).","journal-title":"Finite Fields Appl."},{"key":"872_CR3","unstructured":"Ball T., Camps E., Chimal-Dzul H., Jaramillo-Velez D., L\u00f3pez H., Nichols N., Perkins M., Soprunov I., Vera G., Whieldon G.: Coding Theory Package for Macaulay2, submitted. https:\/\/arxiv.org\/pdf\/2007.06795.pdf"},{"issue":"1","key":"872_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3934\/amc.2008.2.15","volume":"2","author":"M Bras-Amor\u00f3s","year":"2008","unstructured":"Bras-Amor\u00f3s M., O\u2019Sullivan M.E.: Duality for some families of correction capability optimized evaluation codes. Adv. Math. Commun. 2(1), 15\u201333 (2008).","journal-title":"Adv. Math. Commun."},{"key":"872_CR5","volume-title":"Cohen-Macaulay Rings","author":"W Bruns","year":"1993","unstructured":"Bruns W., Herzog J.: Cohen-Macaulay Rings. Cambridge University Press, Cambridge (1993)."},{"key":"872_CR6","doi-asserted-by":"crossref","unstructured":"Camps E., L\u00f3pez H., Matthews G., Sarmiento E.: Monomial-Cartesian codes closed under divisibility. De Gruyter Proceedings in Mathematics 199\u2013208 (2020).","DOI":"10.1515\/9783110621730-014"},{"key":"872_CR7","doi-asserted-by":"crossref","unstructured":"Camps E., L\u00f3pez H., Matthews, G., Sarmiento, E.: Polar decreasing monomial-Cartesian codes. IEEE Trans. Inform. Theory. 2020. https:\/\/doi.org\/10.1109\/TIT.2020.3047624","DOI":"10.1109\/TIT.2020.3047624"},{"key":"872_CR8","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ffa.2013.06.004","volume":"24","author":"C Carvalho","year":"2013","unstructured":"Carvalho C.: On the second Hamming weight of some Reed-Muller type codes. Finite Fields Appl. 24, 88\u201394 (2013).","journal-title":"Finite Fields Appl."},{"key":"872_CR9","doi-asserted-by":"crossref","unstructured":"Celebi Demirarslan P., Soprunov I.: On dual toric complete intersection codes. Finite Fields Appl. 33 (2015), 118\u2013136.","DOI":"10.1016\/j.ffa.2014.12.001"},{"key":"872_CR10","doi-asserted-by":"crossref","unstructured":"Cooper S.M., Seceleanu A., Toh\u01ceneanu S.O., Vaz Pinto M., Villarreal R.H.: Generalized minimum distance functions and algebraic invariants of Geramita ideals. Adv. Appl. Math. 112 (2020), 101940.","DOI":"10.1016\/j.aam.2019.101940"},{"key":"872_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2181-2","volume-title":"Ideals, Varieties, and Algorithms","author":"D Cox","year":"1992","unstructured":"Cox D., Little J., O\u2019Shea D.: Ideals, Varieties, and Algorithms. Springer, New York (1992)."},{"key":"872_CR12","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/S0019-9958(70)90214-7","volume":"16","author":"P Delsarte","year":"1970","unstructured":"Delsarte P., Goethals J.M., MacWilliams F.J.: On generalized Reed-Muller codes and their relatives. Inf. Control 16, 403\u2013442 (1970).","journal-title":"Inf. Control"},{"issue":"6","key":"872_CR13","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s002000000047","volume":"11","author":"IM Duursma","year":"2001","unstructured":"Duursma I.M., Renter\u00eda C., Tapia-Recillas H.: Reed-Muller codes on complete intersections. Appl. Algebra Eng. Commun. Comput. 11(6), 455\u2013462 (2001).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"872_CR14","volume-title":"Commutative Algebra with a view toward Algebraic Geometry, Graduate Texts in Mathematics 150","author":"D Eisenbud","year":"1995","unstructured":"Eisenbud D.: Commutative Algebra with a view toward Algebraic Geometry, Graduate Texts in Mathematics 150. Springer, New York (1995)."},{"key":"872_CR15","series-title":"Graduate Texts in Mathematics 229","volume-title":"The Geometry of Syzygies: A Second Course in Commutative Algebra and Algebraic Geometry","author":"D Eisenbud","year":"2005","unstructured":"Eisenbud D.: The Geometry of Syzygies: A Second Course in Commutative Algebra and Algebraic Geometry. Graduate Texts in Mathematics 229Springer, New York (2005)."},{"key":"872_CR16","doi-asserted-by":"crossref","unstructured":"Fr\u00f6berg F., Laksov D.: Compressed Algebras, Lecture Notes in Mathematics 1092 (1984), Springer, pp. 121\u2013151.","DOI":"10.1007\/BFb0099360"},{"key":"872_CR17","doi-asserted-by":"crossref","unstructured":"Geil O.: Evaluation codes from an affine variety code perspective, Advances in algebraic geometry codes, 153\u2013180, Ser. Coding Theory Cryptol., 5, World Sci. Publ., Hackensack, NJ, 2008.","DOI":"10.1142\/9789812794017_0004"},{"issue":"2","key":"872_CR18","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/18.825832","volume":"46","author":"O Geil","year":"2000","unstructured":"Geil O., H\u00f8holdt T.: Footprints or generalized Bezout\u2019s theorem. IEEE Trans. Inform. Theory 46(2), 635\u2013641 (2000).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"872_CR19","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1006\/ffta.2001.0347","volume":"8","author":"O Geil","year":"2002","unstructured":"Geil O., Pellikaan R.: On the structure of order domains. Finite Fields Appl. 8(3), 369\u2013396 (2002).","journal-title":"Finite Fields Appl."},{"issue":"1","key":"872_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1090\/S0002-9947-1993-1102886-5","volume":"339","author":"AV Geramita","year":"1993","unstructured":"Geramita A.V., Kreuzer M., Robbiano L.: Cayley-Bacharach schemes and their canonical modules. Trans. Am. Math. Soc. 339(1), 163\u2013189 (1993).","journal-title":"Trans. Am. Math. Soc."},{"issue":"3","key":"872_CR21","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10801-018-0855-x","volume":"50","author":"M Gonz\u00e1lez-Sarabia","year":"2019","unstructured":"Gonz\u00e1lez-Sarabia M., Mart\u00ednez-Bernal J., Villarreal R.H., Vivares C.E.: Generalized minimum distance functions. J. Algebraic Combin. 50(3), 317\u2013346 (2019).","journal-title":"J. Algebraic Combin."},{"key":"872_CR22","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s00200-003-0136-2","volume":"14","author":"M Gonz\u00e1lez-Sarabia","year":"2004","unstructured":"Gonz\u00e1lez-Sarabia M., Renter\u00eda C.: The dual code of some Reed-Muller type codes. Appl. Algebra Eng. Commun. Comput. 14, 329\u2013333 (2004).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"4","key":"872_CR23","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/S1071-5797(02)90360-6","volume":"8","author":"M Gonz\u00e1lez-Sarabia","year":"2002","unstructured":"Gonz\u00e1lez-Sarabia M., Renter\u00eda C., Tapia-Recillas H.: Reed-Muller-type codes over the Segre variety. Finite Fields Appl. 8(4), 511\u2013518 (2002).","journal-title":"Finite Fields Appl."},{"key":"872_CR24","unstructured":"Grayson D., Stillman M.: Macaulay$$2$$, 1996. Available at http:\/\/www.math.uiuc.edu\/Macaulay2\/."},{"issue":"1","key":"872_CR25","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/18.651015","volume":"44","author":"P Heijnen","year":"1998","unstructured":"Heijnen P., Pellikaan R.: Generalized Hamming weights of $$q$$-ary Reed-Muller codes. IEEE Trans. Inform. Theory 44(1), 181\u2013196 (1998).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"872_CR26","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.jalgebra.2016.02.023","volume":"456","author":"A Higashitani","year":"2016","unstructured":"Higashitani A.: Almost Gorenstein homogeneous rings and their $$h$$-vectors. J. Algebra 456, 190\u2013206 (2016).","journal-title":"J. Algebra"},{"key":"872_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)."},{"key":"872_CR28","doi-asserted-by":"crossref","unstructured":"Jaramillo D., Vaz Pinto M., Villarreal R.H.: Evaluation codes and their basic parameters. Des. Codes Cryptogr 89(2), 269\u2013300 (2021).","DOI":"10.1007\/s10623-020-00818-8"},{"key":"872_CR29","volume-title":"Computational Commutative Algebra 2","author":"M Kreuzer","year":"2005","unstructured":"Kreuzer M., Robbiano L.: Computational Commutative Algebra 2. Springer, Berlin (2005)."},{"key":"872_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ffa.2013.05.004","volume":"24","author":"J Little","year":"2013","unstructured":"Little J.: Remarks on generalized toric codes. Finite Fields Appl. 24, 1\u201314 (2013).","journal-title":"Finite Fields Appl."},{"key":"872_CR31","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ffa.2019.01.004","volume":"57","author":"HH L\u00f3pez","year":"2019","unstructured":"L\u00f3pez H.H., Manganiello F., Matthews G.: Affine Cartesian codes with complementary duals. Finite Fields Appl. 57, 13\u201328 (2019).","journal-title":"Finite Fields Appl."},{"issue":"8","key":"872_CR32","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s10623-020-00726-x","volume":"88","author":"HH L\u00f3pez","year":"2020","unstructured":"L\u00f3pez H.H., Matthews G., Soprunov I.: Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes. Des. Codes Cryptogr. 88(8), 1673\u20131685 (2020).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"872_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-012-9714-2","volume":"71","author":"HH L\u00f3pez","year":"2014","unstructured":"L\u00f3pez H.H., Renter\u00eda C., Villarreal R.H.: Affine cartesian codes. Des. Codes Cryptogr. 71(1), 5\u201319 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"872_CR34","doi-asserted-by":"crossref","unstructured":"L\u00f3pez H.H., Sarmiento E., Vaz Pinto M., Villarreal R.H.: Parameterized affine codes. Studia Sci. Math. Hungar. 49(3), 406\u2013418 (2012)","DOI":"10.1556\/sscmath.49.2012.3.1216"},{"key":"872_CR35","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. Elsevier, North-Holland (1977)."},{"issue":"5","key":"872_CR36","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.jsc.2007.07.018","volume":"44","author":"D Ruano","year":"2009","unstructured":"Ruano D.: On the structure of generalized toric codes. J. Symbol. Comput. 44(5), 499\u2013506 (2009).","journal-title":"J. Symbol. Comput."},{"issue":"2","key":"872_CR37","first-page":"85","volume":"2","author":"I Soprunov","year":"2015","unstructured":"Soprunov I.: Lattice polytopes in coding theory. J. Algebra Comb. Discrete Struct. Appl. 2(2), 85\u201394 (2015).","journal-title":"J. Algebra Comb. Discrete Struct. Appl."},{"issue":"6","key":"872_CR38","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1109\/18.104317","volume":"37","author":"A S\u00f8rensen","year":"1991","unstructured":"S\u00f8rensen A.: Projective Reed-Muller codes. IEEE Trans. Inform. Theory 37(6), 1567\u20131576 (1991).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"872_CR39","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/0001-8708(78)90045-2","volume":"28","author":"R Stanley","year":"1978","unstructured":"Stanley R.: Hilbert functions of graded algebras. Adv. Math. 28, 57\u201383 (1978).","journal-title":"Adv. Math."},{"key":"872_CR40","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-76878-4","volume-title":"Algebraic Function Fields and Codes, Second Edition, Graduate Texts in Mathematics 254","author":"H Stichtenoth","year":"2009","unstructured":"Stichtenoth H.: Algebraic Function Fields and Codes, Second Edition, Graduate Texts in Mathematics 254. Springer, Berlin (2009)."},{"issue":"3","key":"872_CR41","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1134\/S0001434619030131","volume":"105","author":"A Tochimani","year":"2019","unstructured":"Tochimani A., Villarreal R.H.: Vanishing ideals over finite fields. Math. Notes 105(3), 429\u2013438 (2019).","journal-title":"Math. Notes"},{"key":"872_CR42","series-title":", Mathematical Surveys and Monographs 139","doi-asserted-by":"publisher","DOI":"10.1090\/surv\/139","volume-title":"Algebraic Geometric Codes: Basic Notions","author":"M Tsfasman","year":"2007","unstructured":"Tsfasman M., Vladut S., Nogin D.: Algebraic Geometric Codes: Basic Notions., Mathematical Surveys and Monographs 139American Mathematical Society, Providence, RI (2007)."},{"key":"872_CR43","unstructured":"Villarreal R.H.: Monomial Algebras, 2nd edn. Monographs and Research Notes in Mathematics, Chapman and Hall\/CRC, Boca Raton, FL (2015)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00872-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00872-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00872-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,25]],"date-time":"2022-12-25T11:31:44Z","timestamp":1671967904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00872-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,25]]},"references-count":43,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["872"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00872-w","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,25]]},"assertion":[{"value":"17 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}