{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:15:52Z","timestamp":1729671352402,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2006.1633779","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"47-51","source":"Crossref","is-referenced-by-count":1,"title":["Perfect Codes in the Johnson Schemes"],"prefix":"10.1109","author":[{"given":"T.","family":"Etzion","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1137\/0124010"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(93)00106-A"},{"key":"18","first-page":"129","article-title":"On the nonexistence of perfect codes in J(2w + p2, w)","volume":"75","author":"shimabukuro","year":"2005","journal-title":"Ars Combinatoria"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(63)90189-X"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(83)90079-1"},{"journal-title":"The Theory of Error-Correcting Codes","year":"1977","author":"macwilliams","key":"13"},{"journal-title":"Completely regular subsets","year":"1992","author":"martin","key":"14"},{"journal-title":"Concrete Mathematics A Foundation for Computer Science","year":"1994","author":"graham","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(82)90045-0"},{"key":"21","first-page":"123","article-title":"The nonexistence of perfect codes over Galois fields","volume":"2","author":"zinov'ev","year":"1973","journal-title":"Probl Contr Inform Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0095-8956(73)90042-7"},{"key":"20","article-title":"Nonexistence theorems for perfect error-correcting-codes","volume":"4","author":"van lint","year":"1971","journal-title":"Computers in Algebra and Number Theory"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056677"},{"key":"1","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1112\/jlms\/s2-16.2.197","article-title":"Codes in bi-partite distance-regular graphs","volume":"2","author":"bannai","year":"1977","journal-title":"Journal of the London Mathematical Society"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881744"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/jcd.20102"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2006.1633779"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480194275692"},{"key":"4","article-title":"An algebraic approach to association schemes and coding theory","volume":"10","author":"delsarte","year":"1973","journal-title":"Philips Journal of Research"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/2304500"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.833355"}],"event":{"name":"2006 IEEE Information Theory Workshop","location":"Punta del Este, Uruguay"},"container-title":["2006 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10885\/34255\/01633779.pdf?arnumber=1633779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T06:02:17Z","timestamp":1497679337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1633779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/itw.2006.1633779","relation":{},"subject":[]}}