{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T14:18:08Z","timestamp":1778336288826,"version":"3.51.4"},"reference-count":48,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2016]]},"DOI":"10.3934\/amc.2016033","type":"journal-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T11:14:28Z","timestamp":1471000468000},"page":"649-682","source":"Crossref","is-referenced-by-count":13,"title":["Constructions and bounds for mixed-dimension subspace codes"],"prefix":"10.3934","volume":"10","author":[{"given":"Thomas","family":"Honold","sequence":"first","affiliation":[]},{"given":"Michael","family":"Kiermaier","sequence":"additional","affiliation":[]},{"given":"Sascha","family":"Kurz","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2016033-1","doi-asserted-by":"publisher","unstructured":"R. Ahlswede and H. Aydinian, On error control codes for random network coding, in <em>IEEE Workshop Network Coding Theory Appl.<\/em>, 2009, 68-73.","DOI":"10.1109\/NETCOD.2009.5191396"},{"key":"key-10.3934\/amc.2016033-2","doi-asserted-by":"publisher","unstructured":"C. Bachoc, A. Passuello, and F. Vallentin, Bounds for projective codes from semidefinite programming, <em>Adv. Math. Commun.<\/em>, <strong>7<\/strong> (2013), 127-145.","DOI":"10.3934\/amc.2013.7.127"},{"key":"key-10.3934\/amc.2016033-3","unstructured":"J. De Beule and L. Storme, <em>Current Research Topics in Galois Geometry<\/em>, Nova Science Publishers, 2011."},{"key":"key-10.3934\/amc.2016033-4","doi-asserted-by":"publisher","unstructured":"A. Beutelspacher, Partial spreads in finite projective spaces and partial designs, <em>Math. Z.<\/em>, <strong>145<\/strong> (1975), 211-230. Corrigendum, ibid., <strong>147<\/strong> (1976), 303.","DOI":"10.1007\/BF01215286"},{"key":"key-10.3934\/amc.2016033-5","doi-asserted-by":"publisher","unstructured":"M. Braun and J. Reichelt, $q$-analogs of packing designs, <em>J. Combin. Des.<\/em>, <strong>22<\/strong> (2014), 306-321.","DOI":"10.1002\/jcd.21376"},{"key":"key-10.3934\/amc.2016033-6","doi-asserted-by":"crossref","unstructured":"P. J. Cameron and J. H. van Lint, <em>Graphs, Codes and Designs<\/em>, Cambridge Univ. Press, 1980. A revised edition of these notes is [7].","DOI":"10.1017\/CBO9780511662140"},{"key":"key-10.3934\/amc.2016033-7","doi-asserted-by":"publisher","unstructured":"P. J. Cameron and J. H. van Lint, <em>Designs, Graphs, Codes and their Links<\/em>, Cambridge Univ. Press, 1991. Revised edition of [6].","DOI":"10.1017\/CBO9780511623714"},{"key":"key-10.3934\/amc.2016033-8","unstructured":"in preparation."},{"key":"key-10.3934\/amc.2016033-9","doi-asserted-by":"publisher","unstructured":"T. Czerwinski and D. Oakden, The translation planes of order twenty-five, <em>J. Combin. Theory Ser. A<\/em>, <strong>59<\/strong> (1992), 193-217.","DOI":"10.1016\/0097-3165(92)90065-3"},{"key":"key-10.3934\/amc.2016033-10","doi-asserted-by":"publisher","unstructured":"P. Delsarte, Bilinear forms over a finite field, with applications to coding theory, <em>J. Combin. Theory Ser. A<\/em>, <strong>25<\/strong> (1978), 226-241.","DOI":"10.1016\/0097-3165(78)90015-8"},{"key":"key-10.3934\/amc.2016033-11","doi-asserted-by":"publisher","unstructured":"P. Dembowski, <em>Finite Geometries<\/em>, Springer-Verlag, 1968.","DOI":"10.1007\/978-3-642-62012-6"},{"key":"key-10.3934\/amc.2016033-12","doi-asserted-by":"publisher","unstructured":"U. Dempwolff, Translation planes of order 27, <em>Des. Codes Cryptogr.<\/em>, <strong>4<\/strong> (1994), 105-121. Erratum, ibid., <strong>5<\/strong> (1995), 81.","DOI":"10.1007\/BF01578865"},{"key":"key-10.3934\/amc.2016033-13","doi-asserted-by":"publisher","unstructured":"U. Dempwolff and A. Reifart, The classification of the translation planes of order 16, I, <em>Geom. Dedicata<\/em>, <strong>15<\/strong> (1983), 137-153.","DOI":"10.1007\/BF00147760"},{"key":"key-10.3934\/amc.2016033-14","unstructured":"J. Eisfeld and L. Storme, <em>(Partial) $t$-Spreads and Minimal $t$-Covers in Finite Projective Spaces<\/em>, Lecture notes, Ghent Univ., 2000."},{"key":"key-10.3934\/amc.2016033-15","unstructured":"preprint, <a href=\"http:\/\/arxiv.org\/abs\/1305.6126\" target=\"_blank\">arXiv:1305.6126<\/a>"},{"key":"key-10.3934\/amc.2016033-16","doi-asserted-by":"publisher","unstructured":"T. Etzion and N. Silberstein, Codes and designs related to lifted MRD codes, <em>IEEE Trans. Inform. Theory<\/em>, <strong>59<\/strong> (2013), 1004-1017. Erratum, ibid., <strong>59<\/strong> (2013), 4730.","DOI":"10.1109\/TIT.2012.2220119"},{"key":"key-10.3934\/amc.2016033-17","doi-asserted-by":"publisher","unstructured":"T. Etzion and L. Storme, Galois geometries and coding theory, <em>Des. Codes Cryptogr.<\/em>, <strong>78<\/strong> (2016), 311-350.","DOI":"10.1007\/s10623-015-0156-5"},{"key":"key-10.3934\/amc.2016033-18","doi-asserted-by":"publisher","unstructured":"T. Etzion and A. Vardy, Error-correcting codes in projective space, <em>IEEE Trans. Inform. Theory<\/em>, <strong>57<\/strong> (2011), 1165-1173.","DOI":"10.1109\/TIT.2010.2095232"},{"key":"key-10.3934\/amc.2016033-19","doi-asserted-by":"publisher","unstructured":"T. Feulner, The automorphism groups of linear codes and canonical representatives of their semilinear isometry classes, <em>Adv. Math. Commun.<\/em>, <strong>3<\/strong> (2009), 363-383.","DOI":"10.3934\/amc.2009.3.363"},{"key":"key-10.3934\/amc.2016033-20","unstructured":"preprint, <a href=\"http:\/\/arxiv.org\/abs\/1305.1193\" target=\"_blank\">arXiv:1305.1193<\/a>"},{"key":"key-10.3934\/amc.2016033-21","unstructured":"T. Feulner, <em>Eine kanonische Form zur Darstellung \u00e4quivalenter Codes - Computergest\u00fctzte Berechnung und ihre Anwendung in der Codierungstheorie, Kryptographie und Geometrie<\/em>, Ph.D thesis, Univ. Bayreuth, 2014. Available online at <a href=\"https:\/\/epub.uni-bayreuth.de\/42\/\" target=\"_blank\">https:\/\/epub.uni-bayreuth.de\/42\/<\/a>"},{"key":"key-10.3934\/amc.2016033-22","doi-asserted-by":"publisher","unstructured":"E. M. Gabidulin and M. Bossert, Algebraic codes for network coding, <em>Probl. Inform. Transm.<\/em>, <strong>45<\/strong> (2009), 343-356.","DOI":"10.1134\/S003294600904005X"},{"key":"key-10.3934\/amc.2016033-23","unstructured":"J. Galambos and I. Simonelli, <em>Bonferroni-Type Inequalities with Applications<\/em>, Springer-Verlag, 1996."},{"key":"key-10.3934\/amc.2016033-24","unstructured":"available online at <a href=\"http:\/\/www.maths.qmul.ac.uk\/~leonard\/partialspreads\/PG42new.pdf\" target=\"_blank\">http:\/\/www.maths.qmul.ac.uk\/~leonard\/partialspreads\/PG42new.pdf<\/a>"},{"key":"key-10.3934\/amc.2016033-25","doi-asserted-by":"publisher","unstructured":"X. Guang and Z. Zhang, <em>Linear Network Error Correction Coding<\/em>, Springer-Verlag, 2014.","DOI":"10.1007\/978-1-4939-0588-1"},{"key":"key-10.3934\/amc.2016033-26","doi-asserted-by":"publisher","unstructured":"M. Hall, Jr., J. D. Swift and R. J. Walker, Uniqueness of the projective plane of order eight, <em>Math. Comp.<\/em>, <strong>10<\/strong> (1956), 186-194.","DOI":"10.2307\/2001913"},{"key":"key-10.3934\/amc.2016033-27","unstructured":"preprint, <a href=\"http:\/\/arxiv.org\/abs\/1601.02864\" target=\"_blank\">arXiv:1601.02864<\/a>"},{"key":"key-10.3934\/amc.2016033-28","unstructured":"J. W. P. Hirschfeld, <em>Finite Projective Spaces of Three Dimensions<\/em>, Oxford Univ. Press, 1985."},{"key":"key-10.3934\/amc.2016033-29","doi-asserted-by":"crossref","unstructured":"J. W. P. Hirschfeld, <em>Projective Geometries over Finite Fields<\/em>, Oxford Univ. Press, 1998.","DOI":"10.1093\/oso\/9780198502951.001.0001"},{"key":"key-10.3934\/amc.2016033-30","doi-asserted-by":"publisher","unstructured":"J. W. P. Hirschfeld and J. A. Thas, <em>General Galois Geometries<\/em>, Oxford Univ. Press, 1991.","DOI":"10.1007\/978-1-4471-6790-7"},{"key":"key-10.3934\/amc.2016033-31","doi-asserted-by":"publisher","unstructured":"T. Honold and M. Kiermaier, On putative $q$-analogues of the Fano plane and related combinatorial structures, in <em>Dynamical Systems, Number Theory and Applications: A Festschrift in Honor of Armin Leutbecher's 80th Birthday<\/em> (eds. T. Hagen, F. Rupp and J. Scheurle), World Scientific, 2016, 141-175. Available online at <a href=\"http:\/\/arxiv.org\/abs\/1504.06688\" target=\"_blank\">arXiv:1504.06688<\/a>","DOI":"10.1142\/9789814699877_0008"},{"key":"key-10.3934\/amc.2016033-32","doi-asserted-by":"publisher","unstructured":"T. Honold, M. Kiermaier and S. Kurz, Optimal binary subspace codes of length $6$, constant dimension $3$ and minimum subspace distance $4$, in <em>11th Int. Conf. Finite Fields Appl.<\/em>, 2013, Magdeburg, 2015, 157-176.","DOI":"10.1090\/conm\/632\/12627"},{"key":"key-10.3934\/amc.2016033-33","unstructured":"Available online at <a href=\"http:\/\/arxiv.org\/abs\/1606.07655\" target=\"_blank\">arXiv:1606.07655<\/a>"},{"key":"key-10.3934\/amc.2016033-34","doi-asserted-by":"publisher","unstructured":"N. L. Johnson, V. Jha and M. Biliotti, <em>Handbook of Finite Translation Planes<\/em>, CRC Press, 2007.","DOI":"10.1201\/9781420011142"},{"key":"key-10.3934\/amc.2016033-35","doi-asserted-by":"publisher","unstructured":"D. J. Kleitman, On an extremal property of antichains in partial orders. The LYM property and some of its implications and applications, in <em>Combinatorics<\/em>, Springer, 1975, 277-290.","DOI":"10.1007\/978-94-010-1826-5_14"},{"key":"key-10.3934\/amc.2016033-36","doi-asserted-by":"publisher","unstructured":"R. Koetter and F. Kschischang, Coding for errors and erasures in random network coding, <em>IEEE Trans. Inform. Theory<\/em>, <strong>54<\/strong> (2008), 3579-3591.","DOI":"10.1109\/TIT.2008.926449"},{"key":"key-10.3934\/amc.2016033-37","unstructured":"J. H. van Lint and R. M. Wilson, <em>A Course in Combinatorics<\/em>, Cambridge Univ. Press, 1992."},{"key":"key-10.3934\/amc.2016033-38","doi-asserted-by":"publisher","unstructured":"H. Liu and T. Honold, Poster: A new approach to the main problem of subspace coding, in <em>9th Int. Conf. Commun. Netw. China (ChinaCom 2014)<\/em>, 2014, 676-677.","DOI":"10.1109\/CHINACOM.2014.7054392"},{"key":"key-10.3934\/amc.2016033-39","unstructured":"F. J. MacWilliams and N. J. A. Sloane, <em>The Theory of Error-Correcting Codes<\/em>, North-Holland Publishing Company, Amsterdam, 1977."},{"key":"key-10.3934\/amc.2016033-40","doi-asserted-by":"publisher","unstructured":"R. Mathon and G. F. Royle, The translation planes of order 49, <em>Des. Codes Cryptogr.<\/em>, <strong>5<\/strong> (1995), 57-72.","DOI":"10.1007\/BF01388504"},{"key":"key-10.3934\/amc.2016033-41","doi-asserted-by":"publisher","unstructured":"B. D. McKay and A. Piperno, Practical graph isomorphism II, <em>J. Symb. Comput.<\/em>, <strong>60<\/strong> (2014), 94-112.","DOI":"10.1016\/j.jsc.2013.09.003"},{"key":"key-10.3934\/amc.2016033-42","doi-asserted-by":"publisher","unstructured":"G. E. Moorhouse, Two-graphs and skew two-graphs in finite geometries, <em>Linear Algebra Appl.<\/em>, <strong>226-228<\/strong> (1995), 529-551.","DOI":"10.1016\/0024-3795(95)00242-J"},{"key":"key-10.3934\/amc.2016033-43","unstructured":"S. Niskanen and P. R. J. \u00d6sterg\u00e5rd, <em>Cliquer User's Guide<\/em>, Version 1.0, Commun. Lab., Helsinki Univ. Techn., Finland, Tech. Rep. T48, 2003."},{"key":"key-10.3934\/amc.2016033-44","doi-asserted-by":"publisher","unstructured":"D. Silva, F. Kschischang and R. Koetter, A rank-metric approach to error control in random network coding, <em>IEEE Trans. Inform. Theory<\/em>, <strong>54<\/strong> (2008), 3951-3967.","DOI":"10.1109\/TIT.2008.928291"},{"key":"key-10.3934\/amc.2016033-45","doi-asserted-by":"publisher","unstructured":"D. Silva, F. Kschischang and R. Koetter, Communication over finite-field matrix channels, <em>IEEE Trans. Inform. Theory<\/em>, <strong>56<\/strong> (2010), 1296-1306.","DOI":"10.1109\/TIT.2009.2039167"},{"key":"key-10.3934\/amc.2016033-46","doi-asserted-by":"publisher","unstructured":"A.-L. Trautmann, Isometry and automorphisms of constant dimension codes, <em>Adv. Math. Commun.<\/em>, <strong>7<\/strong> (2013), 147-160.","DOI":"10.3934\/amc.2013.7.147"},{"key":"key-10.3934\/amc.2016033-47","doi-asserted-by":"crossref","unstructured":"R. W. Yeung and N. Cai, Network error correction, part I: Basic concepts and upper bounds, <em>Commun. Inform. Syst.<\/em>, <strong>6<\/strong> (2006), 19-35.","DOI":"10.4310\/CIS.2006.v6.n1.a2"},{"key":"key-10.3934\/amc.2016033-48","doi-asserted-by":"crossref","unstructured":"R. W. Yeung and N. Cai, Network error correction, part II: Lower bounds, <em>Commun. Inform. Syst.<\/em>, <strong>6<\/strong> (2006), 37-54.","DOI":"10.4310\/CIS.2006.v6.n1.a3"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=12791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:07:58Z","timestamp":1772791678000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2016033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2016033","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}