

Author: Maruta T.
Publisher: Springer Publishing Company
ISSN: 0046-5755
Source: Geometriae Dedicata, Vol.74, Iss.3, 1999-03, pp. : 305-311
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


On the minimum length of some linear codes
Designs, Codes and Cryptography, Vol. 43, Iss. 2-3, 2007-06 ,pp. :






On the maximality of linear codes
Designs, Codes and Cryptography, Vol. 53, Iss. 1, 2009-10 ,pp. :


A generalized extension theorem for linear codes
Designs, Codes and Cryptography, Vol. 62, Iss. 1, 2012-01 ,pp. :