{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:31Z","timestamp":1740131671987,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60772093","60802014","60872063"],"award-info":[{"award-number":["60772093","60802014","60872063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chinese Specialized Research Fund for the Doctoral Program of Higher Education","award":["200803351023","200803351027"],"award-info":[{"award-number":["200803351023","200803351027"]}]},{"name":"National Key Basic Research Program of China","award":["2012CB316104"],"award-info":[{"award-number":["2012CB316104"]}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["Y106068","LR12F01002"],"award-info":[{"award-number":["Y106068","LR12F01002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/tit.2014.2341560","type":"journal-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T14:59:02Z","timestamp":1406041142000},"page":"5950-5965","source":"Crossref","is-referenced-by-count":0,"title":["Constructing Linear Encoders With Good Spectra"],"prefix":"10.1109","volume":"60","author":[{"given":"Shengtian","family":"Yang","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Honold","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peiliang","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2179842"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2059490"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1353\/ajm.1999.0024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1963.tb04003.x"},{"journal-title":"Algebra","year":"1974","author":"hungerford","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009815"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/18.782171"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2095072"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56755-1_21"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(93)00106-A"},{"journal-title":"Constructing Linear Encoders With Good Spectra","year":"2014","author":"yang","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref11","first-page":"201","article-title":"Coding theorems for &#x2018;turbo-like&#x2019; codes","author":"divsalar","year":"1998","journal-title":"Proc 36th Allerton Conf Commun Control Comput"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054898"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077"},{"key":"ref14","first-page":"3","article-title":"An introduction to algebraic codes","volume":"1","author":"pless","year":"1998","journal-title":"Handbook of Coding Theory"},{"journal-title":"Information Theory and Reliable Communication","year":"1968","author":"gallager","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/18.782147"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.824917"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(78)90015-8"},{"key":"ref19","first-page":"1","article-title":"Theory of codes with maximum rank distance","volume":"21","author":"gabidulin","year":"1985","journal-title":"Problems Inf Transmiss"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855604"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.828064"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162642"},{"article-title":"Distributed source coding using syndromes (DISCUS)","year":"2001","author":"pradhan","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2005.65"},{"article-title":"Design and analysis of capacity-achieving codes and optimal receivers with low complexity","year":"2006","author":"hsu","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.878215"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871046"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2013009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/18.75248"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2012.6.203"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928291"},{"journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems","year":"1981","author":"csisz\u00e1r","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/1098-2418(200010\/12)17:3\/4<197::AID-RSA2>3.0.CO;2-K"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/18.165454"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/070686615"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/2690367"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/6895347\/06862007.pdf?arnumber=6862007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:51:20Z","timestamp":1641988280000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6862007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":42,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tit.2014.2341560","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2014,10]]}}}