{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:15:16Z","timestamp":1761293716666},"reference-count":26,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The American Mathematical Monthly"],"published-print":{"date-parts":[[2018,4,21]]},"DOI":"10.1080\/00029890.2018.1420333","type":"journal-article","created":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T20:37:55Z","timestamp":1521751075000},"page":"320-338","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["A Decoding Approach to Reed\u2013Solomon Codes from Their Definition"],"prefix":"10.1080","volume":"125","author":[{"given":"Maria","family":"Bras-Amor\u00f3s","sequence":"first","affiliation":[{"name":"Universitat Rovira i Virgili, Av. Pa\u00efsos Catalans 26, 43007 Tarragona, Catalonia"}]}],"member":"301","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"cit0001","volume-title":"Algebraic Coding Theory","author":"Berlekamp E. R.","year":"1968"},{"key":"cit0002","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/PROC.1980.11696","volume":"68","author":"Berlekamp E. R.","year":"1980","journal-title":"Proceedings of the IEEE"},{"key":"cit0003","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/TIT.1982.1056591","volume":"28","author":"Berlekamp E. R.","year":"1982","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0004","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/18.490539","volume":"42","author":"Berlekamp E. R.","year":"1996","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0005","volume-title":"Introduction to Coding Theory","author":"Bierbrauer J.","year":"2005"},{"key":"cit0006","doi-asserted-by":"crossref","first-page":"7320","DOI":"10.1109\/TIT.2013.2274454","volume":"59","author":"Bossert M.","year":"2013","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0007","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1049\/el:19930689","volume":"29","author":"Chambers W. G.","year":"1993","journal-title":"Electron. Lett."},{"key":"cit0008","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TIT.1987.1057299","volume":"33","author":"Dornstetter J.-L.","year":"1987","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0009","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1109\/TIT.2004.842738","volume":"51","author":"Fedorenko S. V.","year":"2005","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0010","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1137\/0109020","volume":"9","author":"Gorenstein D.","year":"1961","journal-title":"J. Soc. Indust. Appl. Math"},{"key":"cit0011","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"Guruswami V.","year":"1999","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0012","doi-asserted-by":"crossref","first-page":"2614","DOI":"10.1109\/18.887869","volume":"46","author":"Heydtmann A. E.","year":"2000","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0013","doi-asserted-by":"crossref","DOI":"10.4171\/001","volume-title":"A Course in Error-Correcting Codes","author":"Justesen J.","year":"2004"},{"key":"cit0014","volume-title":"The Theory of Error-Correcting Codes","volume":"16","author":"MacWilliams F. J.","year":"1977"},{"key":"cit0015","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"Massey J. L.","year":"1969","journal-title":"IEEE Trans. Inform. Theory"},{"key":"cit0016","first-page":"139","volume-title":"Cheng, J., Schober, R., chairs. 12th Canadian Workshop on Information Theory (CWIT), 2011. Piscataway, NJ: IEEE","author":"Mateer T. D.","year":"2011"},{"key":"cit0017","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10623-012-9626-1","volume":"69","author":"Mateer T. D.","year":"2013","journal-title":"Des. Codes Cryptogr"},{"key":"cit0018","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/0012-365X(92)90567-Y","volume":"106","author":"Pellikaan R.","year":"1992","journal-title":"Discrete Math"},{"key":"cit0019","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0378-3758(95)00088-7","volume":"51","author":"Pellikaan R.","year":"1996","journal-title":"J. Statist. Plann. Inference"},{"key":"cit0020","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/TIT.1960.1057586","volume":"6","author":"Peterson W. W.","year":"1960","journal-title":"IRE Trans. Inform. Theory"},{"key":"cit0021","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"Reed I. S.","year":"1960","journal-title":"J. Soc. Indust. Appl. Math"},{"key":"cit0022","volume-title":"Introduction to Coding and Information Theory","author":"Roman S.","year":"1997"},{"key":"cit0023","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511808968","volume-title":"Introduction to Coding Theory","author":"Roth R. M.","year":"2006"},{"key":"cit0024","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"Shannon C. E.","year":"1948","journal-title":"Bell System Tech. J"},{"key":"cit0025","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1006\/jcom.1997.0439","volume":"13","author":"Sudan M.","year":"1997","journal-title":"J. Complex"},{"key":"cit0026","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0019-9958(75)90090-X","volume":"27","author":"Sugiyama Y.","year":"1975","journal-title":"Inform. Control"}],"container-title":["The American Mathematical Monthly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00029890.2018.1420333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T20:38:42Z","timestamp":1521751122000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00029890.2018.1420333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,22]]},"references-count":26,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,3,22]]},"published-print":{"date-parts":[[2018,4,21]]}},"alternative-id":["10.1080\/00029890.2018.1420333"],"URL":"https:\/\/doi.org\/10.1080\/00029890.2018.1420333","relation":{},"ISSN":["0002-9890","1930-0972"],"issn-type":[{"value":"0002-9890","type":"print"},{"value":"1930-0972","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uamm20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uamm20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}