{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:06:06Z","timestamp":1754161566529,"version":"3.41.2"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1999,12]]},"DOI":"10.1023\/a:1008349506366","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"183-186","source":"Crossref","is-referenced-by-count":1,"title":["Hypergraphical Codes Arising from Binary Trades"],"prefix":"10.1007","volume":"18","author":[{"given":"G. B.","family":"Khosrovshahi","sequence":"first","affiliation":[]},{"given":"Reza","family":"Naserasr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"240920_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-03521-2","volume-title":"Graph Theory with Applications","author":"J. A. Bondy","year":"1976","unstructured":"J. A. Bondy and U. S. R. Murty, Graph Theory with Applications, North Holland, Amsterdam (1976)."},{"key":"240920_CR2","series-title":"IMA Math. Appl.","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-1-4615-6654-0_9","volume-title":"Coding Theory and Design Theory, Part II, Design Theory","author":"A. S. Hedayat","year":"1990","unstructured":"A. S. Hedayat, The theory of trade-off for t-designs, Coding Theory and Design Theory, Part II, Design Theory (D. Ray-Chaduhuri, ed.), IMA Math. Appl., Springer, New York, Vol. 21 (1990) pp. 101-126."},{"key":"240920_CR3","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/BF01198078","volume":"65","author":"D. Jungnickel","year":"1995","unstructured":"D. Jungnickel and S. A. Vanstone, An application of coding theory to a problem in graphical enumeration, Arch. Math., Vol. 65 (1995) pp. 461-464.","journal-title":"Arch. Math."},{"issue":"1","key":"240920_CR4","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/18.567663","volume":"43","author":"D. Jungnickel","year":"1997","unstructured":"D. Jungnickel and S. A. Vanstone, Graphical codes revisited, IEEE Trans. Inform. Th., Vol. 43,No. 1 (1997) pp. 136-146.","journal-title":"IEEE Trans. Inform. Th."},{"key":"240920_CR5","unstructured":"G. B. Khosrovshahi, R. Naserasr and B. Tayfeh-Rezaie, Ternary trades and their codes, to appear."},{"key":"240920_CR6","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North Holland, Amsterdam (1977)."},{"key":"240920_CR7","doi-asserted-by":"crossref","unstructured":"J. H. van Lint, Introduction to Coding Theory, Berlin-Heidelberg-New York (1982).","DOI":"10.1007\/978-3-662-07998-0"},{"key":"240920_CR8","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/S0195-6698(13)80046-7","volume":"11","author":"R. M. Wilson","year":"1990","unstructured":"R. M. Wilson, A diagonal form for the incidence matrices of t-subsets vs. k-subsets, European J. Combin., Vol. 11 (1990) pp. 609-615.","journal-title":"European J. Combin."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008349506366.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008349506366\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008349506366.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:37:27Z","timestamp":1753760247000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008349506366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12]]},"references-count":8,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[1999,12]]}},"alternative-id":["240920"],"URL":"https:\/\/doi.org\/10.1023\/a:1008349506366","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1999,12]]}}}