Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc3.bht:"
@article{DBLP:journals/dcc/Barg93, author = {Alexander Barg}, title = {Incomplete Sums, DC-Constrained Codes, and Codes that Maintain Synchronization}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {105--116}, year = {1993}, url = {https://doi.org/10.1007/BF01388409}, doi = {10.1007/BF01388409}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Barg93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Beth93, author = {Thomas Beth}, title = {The GF(p)-Dimension of the Codes Generated by the Classical Point-Line Geometries over GP(p)}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {199--207}, year = {1993}, url = {https://doi.org/10.1007/BF01388481}, doi = {10.1007/BF01388481}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Beth93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeutelspacherW93, author = {Albrecht Beutelspacher and Ferenc Wettl}, title = {On 2-Level Secret Sharing}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {127--134}, year = {1993}, url = {https://doi.org/10.1007/BF01388411}, doi = {10.1007/BF01388411}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeutelspacherW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BitanE93, author = {Sara Bitan and Tuvi Etzion}, title = {The Last Packing Number of Quadruples, and Cyclic {SQS}}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {4}, pages = {283--313}, year = {1993}, url = {https://doi.org/10.1007/BF01418528}, doi = {10.1007/BF01418528}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BitanE93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisM93, author = {Aart Blokhuis and Klaus Metsch}, title = {On the Size of a Maximal Partial Spread}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {187--191}, year = {1993}, url = {https://doi.org/10.1007/BF01388479}, doi = {10.1007/BF01388479}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Boyvalenkov93, author = {Peter G. Boyvalenkov}, title = {Nonexistence of Certain Symmetrical Spherical Codes}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {69--74}, year = {1993}, url = {https://doi.org/10.1007/BF01389356}, doi = {10.1007/BF01389356}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Boyvalenkov93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BrouwerT93, author = {Andries E. Brouwer and Ludo M. G. M. Tolhuizen}, title = {A Sharpening of the Johnson Bound for Binary Linear Codes and Nonexistence of Linear Codes with Preparata Parameters}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {95--98}, year = {1993}, url = {https://doi.org/10.1007/BF01388407}, doi = {10.1007/BF01388407}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BrouwerT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet93, author = {Claude Carlet}, title = {Partially-Bent Functions}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {135--145}, year = {1993}, url = {https://doi.org/10.1007/BF01388412}, doi = {10.1007/BF01388412}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet93a, author = {Claude Carlet}, title = {The Automorphism Groups of the Delsarte-Goethals Codes}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {237--249}, year = {1993}, url = {https://doi.org/10.1007/BF01388485}, doi = {10.1007/BF01388485}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Chan93, author = {W. K. Chan}, title = {Necessary Conditions for Menon Difference Sets}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {147--154}, year = {1993}, url = {https://doi.org/10.1007/BF01388413}, doi = {10.1007/BF01388413}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Chan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ColbournRZ93, author = {Charles J. Colbourn and Alexander Rosa and Stefan Zn{\'{a}}m}, title = {The Spectrum of Maximal Partial Steiner Triple Systems}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {209--219}, year = {1993}, url = {https://doi.org/10.1007/BF01388482}, doi = {10.1007/BF01388482}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ColbournRZ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dam93, author = {Edwin R. van Dam}, title = {Classifications of Spreads of PG(3, 4) {\textbackslash} PG(3, 2)}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {193--198}, year = {1993}, url = {https://doi.org/10.1007/BF01388480}, doi = {10.1007/BF01388480}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dam93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavisJ93, author = {James A. Davis and Jonathan Jedwab}, title = {A Note on New Semi-Regular Divisible Difference Sets}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {4}, pages = {379--381}, year = {1993}, url = {https://doi.org/10.1007/BF01418532}, doi = {10.1007/BF01418532}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavisJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dougherty93, author = {Steven T. Dougherty}, title = {Nets and Their Codes}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {4}, pages = {315--331}, year = {1993}, url = {https://doi.org/10.1007/BF01418529}, doi = {10.1007/BF01418529}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dougherty93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GeiselmannG93, author = {Willi Geiselmann and Dieter Gollmann}, title = {Self-Dual Bases in F\({}_{\mbox{q\({}^{\mbox{n}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {4}, pages = {333--345}, year = {1993}, url = {https://doi.org/10.1007/BF01418530}, doi = {10.1007/BF01418530}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GeiselmannG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HamalainenHKL93, author = {Heikki O. H{\"{a}}m{\"{a}}l{\"{a}}inen and Iiro S. Honkala and Markku K. Kaikkonen and Simon Litsyn}, title = {Bounds for Binary Multiple Covering Codes}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {251--275}, year = {1993}, url = {https://doi.org/10.1007/BF01388486}, doi = {10.1007/BF01388486}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HamalainenHKL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HareM93, author = {Donovan R. Hare and William McCuaig}, title = {The Connectivity of the Block-Intersection Graphs of Designs}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {5--8}, year = {1993}, url = {https://doi.org/10.1007/BF01389350}, doi = {10.1007/BF01389350}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HareM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hou93, author = {Xiang{-}dong Hou}, title = {Further Results on the Covering Radii of the Reed-Muller Codes}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {167--177}, year = {1993}, url = {https://doi.org/10.1007/BF01388415}, doi = {10.1007/BF01388415}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hou93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KeyS93, author = {Jennifer D. Key and F. E. Sullivan}, title = {Codes of Steiner Triple and Quadruple Systems}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {117--125}, year = {1993}, url = {https://doi.org/10.1007/BF01388410}, doi = {10.1007/BF01388410}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KeyS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Khachatrian93, author = {Levon H. Khachatrian}, title = {The Lower bound of the Quadratic Spans of DeBruijn Sequences}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {29--32}, year = {1993}, url = {https://doi.org/10.1007/BF01389353}, doi = {10.1007/BF01389353}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Khachatrian93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Klapper93, author = {Andrew Klapper}, title = {Cross-Correlations of Geometric Sequences in Characteristic Two}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {4}, pages = {347--377}, year = {1993}, url = {https://doi.org/10.1007/BF01418531}, doi = {10.1007/BF01418531}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Klapper93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lamken93, author = {Esther R. Lamken}, title = {Existence Results for Generalized Balanced Tournament Designs with Block Size 3}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {33--61}, year = {1993}, url = {https://doi.org/10.1007/BF01389354}, doi = {10.1007/BF01389354}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lamken93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LauneyH93, author = {Warwick de Launey and Kathy J. Horadam}, title = {A Weak Difference Set Construction for Higher Dimensional Designs}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {75--87}, year = {1993}, url = {https://doi.org/10.1007/BF01389357}, doi = {10.1007/BF01389357}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LauneyH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Laywine93, author = {Charles Laywine}, title = {Subsquares in Orthogonal Latin Squares as Subspaces in Affine Geometries: {A} Generalization of an Equivalence of Bose}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {21--28}, year = {1993}, url = {https://doi.org/10.1007/BF01389352}, doi = {10.1007/BF01389352}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Laywine93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MavronW93, author = {Vassili C. Mavron and W. D. Wallis}, title = {Cubic Arcs in Cubic Nets}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {99--104}, year = {1993}, url = {https://doi.org/10.1007/BF01388408}, doi = {10.1007/BF01388408}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MavronW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OKeefeR93, author = {Christine M. O'Keefe and Alan Rahilly}, title = {Spreads and Group Divisible Designs}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {229--235}, year = {1993}, url = {https://doi.org/10.1007/BF01388484}, doi = {10.1007/BF01388484}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OKeefeR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Rifa-Coma93, author = {Josep Rif{\`{a}}{-}Coma}, title = {How to Avoid the Cheaters Succeeding in the Key Sharing Scheme}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {221--228}, year = {1993}, url = {https://doi.org/10.1007/BF01388483}, doi = {10.1007/BF01388483}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Rifa-Coma93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SaneS93, author = {Sharad S. Sane and Mohan S. Shrikhande}, title = {Some Characterizations of Quasi-Symmetric Designs with a Spread}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {155--166}, year = {1993}, url = {https://doi.org/10.1007/BF01388414}, doi = {10.1007/BF01388414}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SaneS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Skinner93, author = {Chris M. Skinner}, title = {Non-symmetric 2-Designs Modulo 2}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {63--68}, year = {1993}, url = {https://doi.org/10.1007/BF01389355}, doi = {10.1007/BF01389355}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Skinner93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WallisYZ93, author = {Walter D. Wallis and Joseph L. Yucas and Guo{-}Hui Zhang}, title = {Single Change Covering Designs}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {1}, pages = {9--19}, year = {1993}, url = {https://doi.org/10.1007/BF01389351}, doi = {10.1007/BF01389351}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WallisYZ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.