{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:51:10Z","timestamp":1750312270251},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2008,12,1]],"date-time":"2008-12-01T00:00:00Z","timestamp":1228089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/tit.2008.2006456","type":"journal-article","created":{"date-parts":[[2008,12,1]],"date-time":"2008-12-01T21:30:00Z","timestamp":1228167000000},"page":"5308-5331","source":"Crossref","is-referenced-by-count":25,"title":["Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes"],"prefix":"10.1109","volume":"54","author":[{"given":"Thorsten","family":"Hehn","sequence":"first","affiliation":[]},{"given":"Olgica","family":"Milenkovic","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Laendner","sequence":"additional","affiliation":[]},{"given":"Johannes B.","family":"Huber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.888996"},{"key":"ref11","author":"macwilliams","year":"1977","journal-title":"The Theory of Error-Correcting Codes"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286453"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2040941"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/b13785","author":"dohmen","year":"2003","journal-title":"Improved Bonferroni Inequalities via Abstract Tubes"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2285843"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/0471722154"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/B:DESI.0000029217.97956.26"},{"key":"ref18","author":"jaffe","year":"0","journal-title":"Information About Binary Linear Codes Web database"},{"key":"ref19","author":"lin","year":"2004","journal-title":"Error Control Coding"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1478-6","author":"hedayat","year":"1999","journal-title":"Orthogonal Arrays Theory and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.887513"},{"key":"ref27","author":"milenkovic","year":"2006","journal-title":"Private Communication with J Han and P H Siegel"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.903137"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.917624"},{"key":"ref29","author":"tarakanov","year":"2001","journal-title":"Difference Sets Encyclopedia of Mathematics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2006456"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557663"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286475"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864441"},{"key":"ref9","first-page":"165","article-title":"stopping and dead-end set enumerators for binary hamming codes","author":"weber","year":"2005","journal-title":"Proc 26th Symp Information Theory in the Benelux"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003839"},{"key":"ref20","author":"hall","year":"1998","journal-title":"Combinatorial Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261947"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365137"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056726"},{"key":"ref23","author":"key","year":"0","journal-title":"Some Recent Developments in Permutation Decoding Presentation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.824918"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1964.14.1405"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/4675712\/04675747.pdf?arnumber=4675747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:47:24Z","timestamp":1638218844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4675747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":29,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2008.2006456","relation":{},"ISSN":["0018-9448"],"issn-type":[{"value":"0018-9448","type":"print"}],"subject":[],"published":{"date-parts":[[2008,12]]}}}