{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:12:30Z","timestamp":1775052750481,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1999,2,1]],"date-time":"1999-02-01T00:00:00Z","timestamp":917827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,2,1]],"date-time":"1999-02-01T00:00:00Z","timestamp":917827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1999,2]]},"DOI":"10.1023\/a:1008382528138","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"103-116","source":"Crossref","is-referenced-by-count":10,"title":["Binomial Moments of the Distance Distribution and the Probability of Undetected Error"],"prefix":"10.1007","volume":"16","author":[{"given":"A.","family":"Barg","sequence":"first","affiliation":[]},{"given":"A.","family":"Ashikhmin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"195203_CR1","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1109\/18.623147","volume":"43","author":"K. A. S. Abdel-Ghaffar","year":"1997","unstructured":"K. A. S. Abdel-Ghaffar, A lower bound on the undetected error probability and strictly optimal codes, IEEE Trans. Inform. Theory, Vol. 43,No. 5 (1997) pp. 1489-1502.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"195203_CR2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s002000050060","volume":"8","author":"A. Barg","year":"1997","unstructured":"A. Barg, The matroid of supports of a linear code, Applicable Algebra in Engineering, Communication and Computing, Vol. 8 (1997) pp. 165-172.","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"195203_CR3","doi-asserted-by":"crossref","unstructured":"T. Brylawski and J. G. Oxley, The Tutte polynomial and its applications, in Matroid Applications (N. White, ed.), Encyclopedia of Mathematics and Its Applications, Vol. 40, Cambridge Univ. Press (1992).","DOI":"10.1017\/CBO9780511662041.007"},{"key":"195203_CR4","doi-asserted-by":"crossref","unstructured":"N. J. Fine, Hypergeometric Series and Applications, AMS (1988).","DOI":"10.1090\/surv\/027"},{"key":"195203_CR5","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1002\/sapm1976552119","volume":"55","author":"C. Greene","year":"1976","unstructured":"C. Greene, Weight enumeration and the geometry of linear codes, Stud. Appl. Math., Vol. 55 (1976) pp. 119-128.","journal-title":"Stud. Appl. Math."},{"issue":"2","key":"195203_CR6","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/18.556112","volume":"43","author":"T. Helleseth","year":"1997","unstructured":"T. Helleseth, T. Kl\u00f8ve, and V. I. Levenshtein, On the information function of an error-correcting code, IEEE Trans. Inform. Theory, Vol. 43,No. 2 (1997) pp. 549-557.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"195203_CR7","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0012-365X(77)90078-4","volume":"18","author":"T. Helleseth","year":"1977","unstructured":"T. Helleseth, T. Kl\u00f8ve, and J. Mykkeltveit, The weight distribution of irreducible cyclic codes with block lengths n1((ql \u2212 1)\/N), Discrete Math., Vol. 18 (1977) pp. 179-211.","journal-title":"Discrete Math."},{"issue":"4","key":"195203_CR8","first-page":"19","volume":"23","author":"G. L. Katsman","year":"1988","unstructured":"G. L. Katsman and M. A. Tsfasman, Spectra of algebraic geometric codes, Problemy Peredachi Informatsii, Vol. 23,No. 4 (1988) pp. 19-34.","journal-title":"Problemy Peredachi Informatsii"},{"key":"195203_CR9","series-title":"Lect. Notes Math.","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/BFb0087994","volume-title":"Coding Theory and Algebraic Geometry","author":"G. L. Katsman","year":"1992","unstructured":"G. L. Katsman, M. A. Tsfasman, and S. G. Vl\u0102du\u0163, Spectra of linear codes and error probability of decoding, in Coding Theory and Algebraic Geometry (H. Stichtenoth and M. A. Tsfasman, eds.), Lect. Notes Math., Vol. 1518, Springer, Berlin (1992) pp. 82-98."},{"key":"195203_CR10","doi-asserted-by":"crossref","unstructured":"T. Kl\u00f8ve and V. I. Korzhik, Error Detecting Codes, Kluwer (1995).","DOI":"10.1007\/978-1-4615-2309-3"},{"issue":"6","key":"195203_CR11","doi-asserted-by":"crossref","first-page":"2257","DOI":"10.1109\/18.556619","volume":"42","author":"T. Kl\u00f8ve","year":"1996","unstructured":"T. Kl\u00f8ve, Bounds on the weight distribution of cosets, IEEE Trans. Inform. Theory, Vol. 42,No. 6 (1996) pp. 2257-2260.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"195203_CR12","first-page":"27","volume":"20","author":"V. I. Korzhik","year":"1965","unstructured":"V. I. Korzhik, Bounds on the probability of undetected error and optimum group codes in a channel with feedback, Radiotechnika, Vol. 20,No. 1 (1965) pp. 27-33. English translation in Telecommun. Radio Eng., Vol. 20, No. 1, pt. 2 (1965) pp. 87\u201392.","journal-title":"Radiotechnika"},{"issue":"3","key":"195203_CR13","first-page":"6","volume":"8","author":"V. K. Leontiev","year":"1972","unstructured":"V. K. Leontiev, Error-detecting encoding, Problemy Peredachi Informatsii, Vol. 8,No. 3 (1972) pp. 6-14.","journal-title":"Problemy Peredachi Informatsii"},{"issue":"1","key":"195203_CR14","first-page":"3","volume":"13","author":"V. I. Levenshtein","year":"1977","unstructured":"V. I. Levenshtein, Bounds on the probability of undetected error, Problemy Peredachi Informatsii, Vol. 13,No. 1 (1977) pp. 3-18.","journal-title":"Problemy Peredachi Informatsii"},{"issue":"1","key":"195203_CR15","first-page":"33","volume":"25","author":"V. I. Levenshtein","year":"1989","unstructured":"V. I. Levenshtein, Straight-line bound for the undetected error exponent, Problemy Peredachi Informatsii, Vol. 25,No. 1 (1989) pp. 33-37.","journal-title":"Problemy Peredachi Informatsii"},{"key":"195203_CR16","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1002\/j.1538-7305.1963.tb04003.x","volume":"42","author":"F. J. MacWilliams","year":"1963","unstructured":"F. J. MacWilliams, A theorem on the distribution of weights in a systematic codes, Bell Syst. Techn. Journal, Vol. 42 (1963) pp. 79-94.","journal-title":"Bell Syst. Techn. Journal"},{"key":"195203_CR17","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/BF01188748","volume":"5","author":"J. Simonis","year":"1994","unstructured":"J. Simonis, The effective length of subcodes, Applicable Algebra in Engineering, Communication and Computing, Vol. 5 (1994) pp. 371-377.","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"195203_CR18","series-title":"Society Lecture Note Series","volume-title":"London Math.","author":"D. J. A. Welsh","year":"1993","unstructured":"D. J. A. Welsh, Complexity: Knots, Colourings and Counting, London Math. Society Lecture Note Series, Vol. 186, Cambridge Univ. Press, Cambridge (1993)."},{"key":"195203_CR19","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1109\/TCOM.1982.1095473","volume":"30","author":"J. K. Wolf","year":"1982","unstructured":"J. K. Wolf, A. M. Michelson, and A. H. Levesque, On the probability of undetected error for linear block codes, IEEE Trans. Commun, Vol. 30 (1982) pp. 317-324.","journal-title":"IEEE Trans. Commun"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008382528138.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008382528138\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008382528138.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:52:46Z","timestamp":1753761166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008382528138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,2]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1999,2]]}},"alternative-id":["195203"],"URL":"https:\/\/doi.org\/10.1023\/a:1008382528138","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,2]]}}}