{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:06:07Z","timestamp":1754161567401,"version":"3.41.2"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[2000,1]]},"DOI":"10.1023\/a:1008307729806","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"27-43","source":"Crossref","is-referenced-by-count":1,"title":["A Gap in GRM Code Weight Distributions"],"prefix":"10.1007","volume":"19","author":[{"given":"Todd D.","family":"Vance","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"202744_CR1","volume-title":"Designs and their Codes, volume 103 of Cambridge Tracts in Mathematics","author":"E. F. Assmus Jr.","year":"1993","unstructured":"E. F. Assmus, Jr. and J. D. Key, Designs and their Codes, volume 103 of Cambridge Tracts in Mathematics, Cambridge University Press, Cambridge (1993)."},{"key":"202744_CR2","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/S0019-9958(63)80010-8","volume":"6","author":"E. F. Assmus Jr.","year":"1963","unstructured":"E. F. Assmus, Jr. and H. F. Mattson, Jr., Error correcting codes: An axiomatic approach, Information and Control, Vol. 6 (1963) pp. 315\u2013330.","journal-title":"Information and Control"},{"key":"202744_CR3","doi-asserted-by":"crossref","first-page":"255","DOI":"10.2307\/2373163","volume":"86","author":"J. Ax","year":"1964","unstructured":"James Ax, Zeroes of polynomials over finite fields, American Journal of Mathematics, Vol. 86 (1964) pp. 255\u2013261.","journal-title":"American Journal of Mathematics"},{"issue":"1","key":"202744_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0012-365X(93)90321-J","volume":"117","author":"T. Berger","year":"1993","unstructured":"Thierry Berger and Pascale Charpin, The automorphism group of generalized Reed-Muller codes, Discrete Mathematics, Vol. 117, No. 1 (1993) pp. 1\u201317.","journal-title":"Discrete Mathematics"},{"key":"202744_CR5","volume-title":"Theory and Practice of Error Control Codes","author":"R. E. Blahut","year":"1983","unstructured":"Richard E. Blahut, Theory and Practice of Error Control Codes, Addison-Wesley Publishing Co., Reading, MA, 1983."},{"key":"202744_CR6","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/S0019-9958(70)90214-7","volume":"16","author":"P. Delsarte","year":"1970","unstructured":"P. Delsarte, J.-M. Goethals, and F. J. MacWilliams, On generalized Reed-Muller codes and their relatives. Information and Control, Vol. 16 (1970) pp. 403\u2013442.","journal-title":"Information and Control"},{"key":"202744_CR7","volume-title":"Communication Theory, London Mathematical Society Student Texts, Vol. 20","author":"C. M. Goldie","year":"1991","unstructured":"Charles M. Goldie and Richard G. E. Pinch, Communication Theory, London Mathematical Society Student Texts, Vol. 20, Cambridge University Press, Cambridge (1991)."},{"key":"202744_CR8","doi-asserted-by":"crossref","unstructured":"Tadao Kasami and Nobuki Tokura, On the weight structure of Reed-Muller codes, IEEE Transactions on Information Theory, Vol. IT-16, No. 6 (1970).","DOI":"10.1109\/TIT.1970.1054545"},{"key":"202744_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-00174-5","volume-title":"Introduction to Coding Theory, Graduate Texts in Mathematics, Vol. 86","author":"J. H. van Lint","year":"1992","unstructured":"J. H. van Lint, Introduction to Coding Theory, Graduate Texts in Mathematics, Vol. 86, Springer-Verlag, New York, 2nd edition (1992).","edition":"2nd edition"},{"key":"202744_CR10","volume-title":"The Theory of Error-Correcting Codes, North-Holland Mathematical Library, Vol. 16","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland Mathematical Library, Vol. 16, North-Holland Publishing Company, New York (1977)."},{"key":"202744_CR11","first-page":"28","volume":"37\u201358-III","author":"R. J. McEliece","year":"1969","unstructured":"R. J. McEliece. Quadratic forms over finite fields and second-order Reed-Muller codes, JPL Space Programs Summary, Vol. 37\u201358-III (1969) pp. 28\u201333.","journal-title":"JPL Space Programs Summary"},{"key":"202744_CR12","volume-title":"Error-Correcting Codes","author":"W. Wesley Peterson","year":"1972","unstructured":"W. Wesley Peterson and E. J. Weldon, Error-Correcting Codes, MIT Press, Cambridge, MA, 2nd edition (1972).","edition":"2nd edition"},{"key":"202744_CR13","series-title":"Wiley-Interscience Series in Discrete Mathematics and Optimization","volume-title":"Introduction to the Theory of Error-Correcting Codes","author":"V. Pless","year":"1989","unstructured":"Vera Pless, Introduction to the Theory of Error-Correcting Codes, Wiley-Interscience Series in Discrete Mathematics and Optimization. John Wiley and Sons, Inc., New York, second edition (1989).","edition":"second edition"},{"key":"202744_CR14","volume-title":"Missing Weights in GRM Codes","author":"T. D. Vance","year":"1997","unstructured":"Todd D. Vance, Missing Weights in GRM Codes, PhD thesis, University of Virginia, Charlottesville, Virginia, May (1997)."},{"issue":"2\u20133","key":"202744_CR15","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/0012-365X(90)90015-A","volume":"83","author":"H. N. Ward","year":"1990","unstructured":"Harold N. Ward, Weight polarization and divisibility, Discrete Mathematics, Vol. 83, No. 2\u20133 (1990) pp. 315\u2013326.","journal-title":"Discrete Mathematics"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008307729806.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008307729806\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008307729806.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:18:05Z","timestamp":1753759085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008307729806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,1]]}},"alternative-id":["202744"],"URL":"https:\/\/doi.org\/10.1023\/a:1008307729806","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2000,1]]}}}