{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T13:41:32Z","timestamp":1648734092489},"reference-count":23,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":4886,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1016\/s0304-3975(99)00180-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T11:51:20Z","timestamp":1027597880000},"page":"3-23","source":"Crossref","is-referenced-by-count":1,"title":["Threshold data structures and coding theory"],"prefix":"10.1016","volume":"235","author":[{"given":"Eric","family":"Bach","sequence":"first","affiliation":[]},{"given":"Marcos","family":"Kiwi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0304-3975(99)00180-2_BIB1","unstructured":"Anonymous, Product Specification: AHA 4011 10 MBytes\/sec Reed\u2013Solomon Error Correction Device, Advanced Hardware Architectures, Inc., Pullman, Washington, no date. [Web site: http:\/\/www.aha.com.]"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB2","series-title":"Algorithmic Number Theory, Vol. 1","author":"Bach","year":"1996"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB3","series-title":"Algebraic Coding Theory","author":"Berlekamp","year":"1968"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB4","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/S0019-9958(67)91016-9","article-title":"On the solution of algebraic equations over finite fields","volume":"10","author":"Berlekamp","year":"1967","journal-title":"Inform. and Control"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB5","series-title":"Theory and Practice of Error Control Codes","author":"Blahut","year":"1983"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB6","first-page":"22","article-title":"Method of decoding Bose-Chaudhuri triple error correcting codes","volume":"3","author":"Blokh","year":"1964","journal-title":"Eng. Cybernet."},{"key":"10.1016\/S0304-3975(99)00180-2_BIB7","doi-asserted-by":"crossref","first-page":"1112","DOI":"10.1109\/TC.1978.1675013","article-title":"A new solution to coherence problems in multicache systems","volume":"C-27","author":"Censier","year":"1978","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0304-3975(99)00180-2_BIB8","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1109\/TIT.1982.1056557","article-title":"Formulas for the solutions of quadratic equations over GF(2m)","volume":"IT-28","author":"Chen","year":"1982","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB9","doi-asserted-by":"crossref","unstructured":"D.T. Chi, A new fast Reed\u2013Solomon decoding algorithm without Chien search, Proc. 1993 IEEE Military Communications Conf. IEEE Press, New York, 1993, pp. 948\u2013952.","DOI":"10.1109\/MILCOM.1993.408681"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB10","first-page":"328","article-title":"Hybrid methods for finding roots of a polynomial \u2014 with application to BCH decoding","volume":"IT-15","author":"Chien","year":"1969","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB11","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TIT.1966.1053883","article-title":"An application of coding theory to document retrieval","volume":"IT-12","author":"Chien","year":"1966","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB12","doi-asserted-by":"crossref","first-page":"1882","DOI":"10.1109\/18.340463","article-title":"Superimposed codes in the Hamming space","volume":"IT-40","author":"Ericson","year":"1994","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB13","series-title":"Proc. 1997 Internat. Symp. on Symbolic and Algebraic Computation","first-page":"184","article-title":"Fast polynomial factorization over high algebraic extensions of finite fields","author":"Kaltofen","year":"1997"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB14","series-title":"The Theory of Error-Correcting Codes","author":"MacWilliams","year":"1997"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB15","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","article-title":"Shift register synthesis and BCH decoding","volume":"IT-15","author":"Massey","year":"1969","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB16","series-title":"Error-control Techniques for Digital Communication","author":"Michelson","year":"1985"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB17","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/TIT.1960.1057586","article-title":"Encoding and error-correction procedures for the Bose-Chaudhuri codes","volume":"IT-6","author":"Peterson","year":"1960","journal-title":"IRE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB18","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/12.559805","article-title":"A cellular structure for a versatile Reed\u2013Solomon decoder","volume":"C-48","author":"Shayan","year":"1997","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0304-3975(99)00180-2_BIB19","series-title":"Proc. 1991 Internat. Symp. on Symbolic and Algebraic Computation","first-page":"14","article-title":"A fast deterministic algorithm for factoring polynomials over finite fields of small characteristic","author":"Shoup","year":"1991"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB20","series-title":"Introduction to Coding Theory","author":"van Lint","year":"1992"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB21","doi-asserted-by":"crossref","unstructured":"W.-D. Weber, A. Gupta, Analysis of cache invalidation patterns in multiprocessors. Proc. Third Internat. Conf. Arch. Supp. Prog. Langs. Op. Sys. (ASPLOS III), 1989, pp. 243\u2013256.","DOI":"10.1145\/70082.68205"},{"key":"10.1016\/S0304-3975(99)00180-2_BIB22","unstructured":"S. Winograd, On factoring polynomials over GF(2\u2217\u2217n), presentation at International Conference on Theoretical Computer Science in Honour of Manuel Blum's 60th Birthday, Hong Kong, April 20, 1998."},{"key":"10.1016\/S0304-3975(99)00180-2_BIB23","unstructured":"D. Wood et al., Mechanisms for cooperative shared memory, CMG Trans. 84 (1994) 51\u201362. [Also in Proc. 20th Ann. Internat. Symp. Computer Architecture, IEEE Press, New York, 1993, pp. 156\u2013168.]"}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397599001802?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397599001802?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T14:22:12Z","timestamp":1556288532000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397599001802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["S0304397599001802"],"URL":"https:\/\/doi.org\/10.1016\/s0304-3975(99)00180-2","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}