The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
1997, volume: 10, number: 1

  1. Stephen D. Cohen
    The Length of Primitive BCH Codes with Minimal Covering Radius. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:5-16 [Journal]
  2. Jean Conan
    On the Enumeration and Generation of Nonweight Equivalent Rate ½ Convolutional Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:17-27 [Journal]
  3. András Gács, Péter Sziklai, Tamás Szonyi
    Two Remarks on Blocking Sets and Nuclei in Planes of Prime Order. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:29-39 [Journal]
  4. Noboru Hamada
    A Necessary and Sufficient Condition for the Existence of Some Ternary [n, k, d] Codes Meeting the Greismer Bound. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:41-56 [Journal]
  5. Gerhard Hiss
    On the Incidence Matrix of the Ree Unital. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:57-62 [Journal]
  6. Marijn van Eupen, Petr Lisonek
    Classification of Some Optimal Ternary Linear Codes of Small Length. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:63-84 [Journal]
  7. A. J. van Zanten
    Lexicographic Order and Linearity. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:1, pp:85-97 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002