{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:09Z","timestamp":1740122409702,"version":"3.37.3"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["A2018408046"],"award-info":[{"award-number":["A2018408046"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Universities in Hebei Province","award":["JYT202102"],"award-info":[{"award-number":["JYT202102"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10878-022-00895-6","type":"journal-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T08:03:52Z","timestamp":1660896232000},"page":"1377-1386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Error-correcting codes based on partial linear maps of finite-dimensional vector spaces"],"prefix":"10.1007","volume":"44","author":[{"given":"Junli","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xuedong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"895_CR1","doi-asserted-by":"crossref","unstructured":"Ahlswede R, Aydinian H (2009) On error control codes for random network coding. Theory and Applications, In: IEEE workshop on network, pp 68\u201373","DOI":"10.1109\/NETCOD.2009.5191396"},{"key":"895_CR2","doi-asserted-by":"crossref","unstructured":"Etzion T, Vardy A (2008) Error-correcting codes in projective space, In: Proceedings of international symposium on information theory, pp 871-875","DOI":"10.1109\/ISIT.2008.4595111"},{"issue":"7","key":"895_CR3","doi-asserted-by":"publisher","first-page":"3207","DOI":"10.1109\/TIT.2010.2048447","volume":"56","author":"M Gadouleau","year":"2010","unstructured":"Gadouleau M, Yan Z (2010) Constant-rank codes and their connection to constant-dimension codes. IEEE Trans Inf Theory 56(7):3207\u20133216","journal-title":"IEEE Trans Inf Theory"},{"key":"895_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ffa.2014.12.004","volume":"33","author":"Y Gao","year":"2015","unstructured":"Gao Y, Wang G (2015) Error-Correcting codes in attenusted space over finite fields. Finite Fields Appl 33:103\u2013117","journal-title":"Finite Fields Appl"},{"key":"895_CR5","first-page":"919","volume":"46","author":"J Guo","year":"2017","unstructured":"Guo J, Li FG (2017) Error-Correcting codes based on Totally isotropic Subspaces in Symplectic spaces. Adv Math (Chinese) 46:919\u2013931","journal-title":"Adv Math (Chinese)"},{"key":"895_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of error-corredting codes","author":"WC Huffman","year":"2003","unstructured":"Huffman WC, Pless V (2003) Fundamentals of error-corredting codes. Cambridge University Press, Cambridge, United Kingdom"},{"issue":"8","key":"895_CR7","doi-asserted-by":"publisher","first-page":"3579","DOI":"10.1109\/TIT.2008.926449","volume":"54","author":"R K\u00f6tter","year":"2008","unstructured":"K\u00f6tter R, Kschischang R (2008) Coding for errors and erasures in random network coding. IEEE Trans Inf Theory 54(8):3579\u20133591","journal-title":"IEEE Trans Inf Theory"},{"key":"895_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10868-6_1","volume":"5921","author":"A Khaleghi","year":"2009","unstructured":"Khaleghi A, Sliva D, Kschischang R (2009) Subspace codes, Springer the series. Lecture Notes Comput Sci 5921:1\u201321","journal-title":"Lecture Notes Comput Sci"},{"key":"895_CR9","first-page":"97","volume":"114","author":"J Liu","year":"2014","unstructured":"Liu J, Jiang W, Zhang B, Xu Q (2014) Lattices associated with partial linear maps of finite vector spaces. Ars Combinatoria 114:97\u2013103","journal-title":"Ars Combinatoria"},{"key":"895_CR10","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/TIT.2003.809567","volume":"49","author":"H Wang","year":"2003","unstructured":"Wang H, Xing C, Safavi-Naini RM (2003) Linear authentication codes: bounds and constructions. IEEE Trans Inf Theory 49:866\u2013872","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-022-00895-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-022-00895-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-022-00895-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T08:50:15Z","timestamp":1664355015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-022-00895-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,19]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["895"],"URL":"https:\/\/doi.org\/10.1007\/s10878-022-00895-6","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2022,8,19]]},"assertion":[{"value":"27 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}