The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
1991, volume: 1, number: 3

  1. Aiden A. Bruen, J. C. Fisher
    The Jamison Method in Galois Geometries. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:199-205 [Journal]
  2. Oliver Pfaff
    The Classification of Doubly Trabsitive Affine Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:207-217 [Journal]
  3. Dirk Hachenberger
    Constructions of Large Translation Nets with Nonabelian Translation Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:219-236 [Journal]
  4. Anne Delandtsheer
    Dimensional Linear Spaces Whose Automophism Groups is (Line, Hyperplane)-Flag Transitive. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:237-245 [Journal]
  5. Dieter Jungnickel, Vladimir D. Tonchev
    Exponential Number of Quasi-Symmetric SDP Designs and Codes Meeting. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:247-253 [Journal]
  6. Jennifer D. Key
    Hermitian Varieties as Codewords. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:255-259 [Journal]
  7. Ernst Willem Lambeck
    A Remark on the Intersection Arrays of Distance Regular Graphs and the Distance Regular Graphs of Diameter d=3i-1 with bi=1 kan k>2. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1991, v:1, n:3, pp:261-266 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002