Search dblp for Publications

export results for "toc:db/journals/dcc/dcc3.bht:"

 download as .bib file

@article{DBLP:journals/dcc/Barg93,
  author       = {Alexander Barg},
  title        = {Incomplete Sums, DC-Constrained Codes, and Codes that Maintain Synchronization},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {105--116},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388409},
  doi          = {10.1007/BF01388409},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Barg93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Beth93,
  author       = {Thomas Beth},
  title        = {The GF(p)-Dimension of the Codes Generated by the Classical Point-Line
                  Geometries over GP(p)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {199--207},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388481},
  doi          = {10.1007/BF01388481},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Beth93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeutelspacherW93,
  author       = {Albrecht Beutelspacher and
                  Ferenc Wettl},
  title        = {On 2-Level Secret Sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {127--134},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388411},
  doi          = {10.1007/BF01388411},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeutelspacherW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BitanE93,
  author       = {Sara Bitan and
                  Tuvi Etzion},
  title        = {The Last Packing Number of Quadruples, and Cyclic {SQS}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {283--313},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01418528},
  doi          = {10.1007/BF01418528},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BitanE93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisM93,
  author       = {Aart Blokhuis and
                  Klaus Metsch},
  title        = {On the Size of a Maximal Partial Spread},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {187--191},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388479},
  doi          = {10.1007/BF01388479},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Boyvalenkov93,
  author       = {Peter G. Boyvalenkov},
  title        = {Nonexistence of Certain Symmetrical Spherical Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {69--74},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389356},
  doi          = {10.1007/BF01389356},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Boyvalenkov93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BrouwerT93,
  author       = {Andries E. Brouwer and
                  Ludo M. G. M. Tolhuizen},
  title        = {A Sharpening of the Johnson Bound for Binary Linear Codes and Nonexistence
                  of Linear Codes with Preparata Parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {95--98},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388407},
  doi          = {10.1007/BF01388407},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BrouwerT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet93,
  author       = {Claude Carlet},
  title        = {Partially-Bent Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {135--145},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388412},
  doi          = {10.1007/BF01388412},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet93a,
  author       = {Claude Carlet},
  title        = {The Automorphism Groups of the Delsarte-Goethals Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {237--249},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388485},
  doi          = {10.1007/BF01388485},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Chan93,
  author       = {W. K. Chan},
  title        = {Necessary Conditions for Menon Difference Sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {147--154},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388413},
  doi          = {10.1007/BF01388413},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Chan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ColbournRZ93,
  author       = {Charles J. Colbourn and
                  Alexander Rosa and
                  Stefan Zn{\'{a}}m},
  title        = {The Spectrum of Maximal Partial Steiner Triple Systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {209--219},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388482},
  doi          = {10.1007/BF01388482},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ColbournRZ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dam93,
  author       = {Edwin R. van Dam},
  title        = {Classifications of Spreads of PG(3, 4) {\textbackslash} PG(3, 2)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {193--198},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388480},
  doi          = {10.1007/BF01388480},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dam93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavisJ93,
  author       = {James A. Davis and
                  Jonathan Jedwab},
  title        = {A Note on New Semi-Regular Divisible Difference Sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {379--381},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01418532},
  doi          = {10.1007/BF01418532},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavisJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dougherty93,
  author       = {Steven T. Dougherty},
  title        = {Nets and Their Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {315--331},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01418529},
  doi          = {10.1007/BF01418529},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dougherty93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GeiselmannG93,
  author       = {Willi Geiselmann and
                  Dieter Gollmann},
  title        = {Self-Dual Bases in F\({}_{\mbox{q\({}^{\mbox{n}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {333--345},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01418530},
  doi          = {10.1007/BF01418530},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GeiselmannG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HamalainenHKL93,
  author       = {Heikki O. H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Iiro S. Honkala and
                  Markku K. Kaikkonen and
                  Simon Litsyn},
  title        = {Bounds for Binary Multiple Covering Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {251--275},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388486},
  doi          = {10.1007/BF01388486},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HamalainenHKL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HareM93,
  author       = {Donovan R. Hare and
                  William McCuaig},
  title        = {The Connectivity of the Block-Intersection Graphs of Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {5--8},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389350},
  doi          = {10.1007/BF01389350},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HareM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hou93,
  author       = {Xiang{-}dong Hou},
  title        = {Further Results on the Covering Radii of the Reed-Muller Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {167--177},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388415},
  doi          = {10.1007/BF01388415},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hou93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KeyS93,
  author       = {Jennifer D. Key and
                  F. E. Sullivan},
  title        = {Codes of Steiner Triple and Quadruple Systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {117--125},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388410},
  doi          = {10.1007/BF01388410},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KeyS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Khachatrian93,
  author       = {Levon H. Khachatrian},
  title        = {The Lower bound of the Quadratic Spans of DeBruijn Sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {29--32},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389353},
  doi          = {10.1007/BF01389353},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Khachatrian93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Klapper93,
  author       = {Andrew Klapper},
  title        = {Cross-Correlations of Geometric Sequences in Characteristic Two},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {347--377},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01418531},
  doi          = {10.1007/BF01418531},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Klapper93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lamken93,
  author       = {Esther R. Lamken},
  title        = {Existence Results for Generalized Balanced Tournament Designs with
                  Block Size 3},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {33--61},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389354},
  doi          = {10.1007/BF01389354},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lamken93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LauneyH93,
  author       = {Warwick de Launey and
                  Kathy J. Horadam},
  title        = {A Weak Difference Set Construction for Higher Dimensional Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {75--87},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389357},
  doi          = {10.1007/BF01389357},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LauneyH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Laywine93,
  author       = {Charles Laywine},
  title        = {Subsquares in Orthogonal Latin Squares as Subspaces in Affine Geometries:
                  {A} Generalization of an Equivalence of Bose},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {21--28},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389352},
  doi          = {10.1007/BF01389352},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Laywine93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MavronW93,
  author       = {Vassili C. Mavron and
                  W. D. Wallis},
  title        = {Cubic Arcs in Cubic Nets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {99--104},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388408},
  doi          = {10.1007/BF01388408},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MavronW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OKeefeR93,
  author       = {Christine M. O'Keefe and
                  Alan Rahilly},
  title        = {Spreads and Group Divisible Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {229--235},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388484},
  doi          = {10.1007/BF01388484},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OKeefeR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Rifa-Coma93,
  author       = {Josep Rif{\`{a}}{-}Coma},
  title        = {How to Avoid the Cheaters Succeeding in the Key Sharing Scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {221--228},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388483},
  doi          = {10.1007/BF01388483},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Rifa-Coma93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SaneS93,
  author       = {Sharad S. Sane and
                  Mohan S. Shrikhande},
  title        = {Some Characterizations of Quasi-Symmetric Designs with a Spread},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {155--166},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388414},
  doi          = {10.1007/BF01388414},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SaneS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Skinner93,
  author       = {Chris M. Skinner},
  title        = {Non-symmetric 2-Designs Modulo 2},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {63--68},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389355},
  doi          = {10.1007/BF01389355},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Skinner93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WallisYZ93,
  author       = {Walter D. Wallis and
                  Joseph L. Yucas and
                  Guo{-}Hui Zhang},
  title        = {Single Change Covering Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {9--19},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01389351},
  doi          = {10.1007/BF01389351},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WallisYZ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics