{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:57Z","timestamp":1772283537171,"version":"3.50.1"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1999,1]]},"DOI":"10.1023\/a:1008370224461","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"29-39","source":"Crossref","is-referenced-by-count":7,"title":["New Linear Codes with Covering Radius 2 and Odd Basis"],"prefix":"10.1007","volume":"16","author":[{"given":"Alexander A.","family":"Davydov","sequence":"first","affiliation":[]},{"given":"Patric R. J.","family":"Osterga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"189028_CR1","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1006\/jcta.1997.2825","volume":"80","author":"J. C. Cock","year":"1997","unstructured":"J. C. Cock and P. R. J. \u00d6sterg\u00e5rd, Ternary covering codes derived from BCH codes, J. Combin. Theory. Ser. A, Vol. 80 (1997) pp. 283-289.","journal-title":"J. Combin. Theory. Ser. A"},{"key":"189028_CR2","series-title":"North-Holland Mathematical Library","volume-title":"Covering Codes","author":"G. Cohen","year":"1997","unstructured":"G. Cohen, I. Honkala, S. Litsyn, and A. Lobstein, Covering Codes, North-Holland Mathematical Library, Vol. 54, Elsevier, Amsterdam (1997)."},{"key":"189028_CR3","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1109\/18.476339","volume":"41","author":"A. A. Davydov","year":"1995","unstructured":"A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp. 2071-2080.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"189028_CR4","first-page":"105","volume-title":"Proceedings of the Fifth International Workshop on Algebraic and Combinatorial Coding Theory","author":"A. A. Davydov","year":"1996","unstructured":"A. A. Davydov, On nonbinary linear codes with covering radius two, Proceedings of the Fifth International Workshop on Algebraic and Combinatorial Coding Theory, Unicorn, Shumen, Bulgaria (1996) pp. 105-110."},{"key":"189028_CR5","unstructured":"A. A. Davydov, Constructions and families of nonbinary linear codes with covering radius 2, submitted."},{"key":"189028_CR6","unstructured":"A. A. Davydov and P. R. J. \u00d6sterg\u00e5rd, Recursive constructions of complete caps, submitted."},{"key":"189028_CR7","series-title":"Encyclopedia of Mathematics and its Applications","volume-title":"Finite Fields","author":"R. Lidl","year":"1983","unstructured":"R. Lidl and H. Niederreiter, Finite Fields, Encyclopedia of Mathematics and its Applications, Vol. 20, Addison-Wesley, Reading, MA (1983)."},{"key":"189028_CR8","unstructured":"P. R. J. \u00d6sterg\u00e5rd, New constructions for q-ary covering codes, Ars Combin., to appear."},{"key":"189028_CR9","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1006\/jcta.1996.0064","volume":"75","author":"F. Pambianco","year":"1996","unstructured":"F. Pambianco and L. Storme, Small complete caps in spaces of even characteristic, J. Combin. Theory. Ser. A, Vol. 75 (1996) pp. 70-84.","journal-title":"J. Combin. Theory. Ser. A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008370224461.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008370224461\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008370224461.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:43:17Z","timestamp":1753760597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008370224461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,1]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1999,1]]}},"alternative-id":["189028"],"URL":"https:\/\/doi.org\/10.1023\/a:1008370224461","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,1]]}}}