Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc68.bht:"
@article{DBLP:journals/dcc/AmarraGP13, author = {Carmen Amarra and Michael Giudici and Cheryl E. Praeger}, title = {Symmetric diameter two graphs with affine-type vertex-quasiprimitive automorphism group}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {127--139}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9644-z}, doi = {10.1007/S10623-012-9644-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AmarraGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BettenCKM13, author = {Anton Betten and Eun Ju Cheon and Seon Jeong Kim and Tatsuya Maruta}, title = {Three families of multiple blocking sets in Desarguesian projective planes of even order}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {49--59}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9634-1}, doi = {10.1007/S10623-012-9634-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BettenCKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeukemannM13, author = {Linda Beukemann and Klaus Metsch}, title = {Small tight sets of hyperbolic quadrics}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {11--24}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9676-4}, doi = {10.1007/S10623-012-9676-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeukemannM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Beule13, author = {Jan De Beule}, title = {On large maximal partial ovoids of the parabolic quadric Q(4, q)}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {3--10}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9629-y}, doi = {10.1007/S10623-012-9629-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Beule13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bruyn13, author = {Bart De Bruyn}, title = {The pseudo-hyperplanes and homogeneous pseudo-embeddings of the generalized quadrangles of order (3, t)}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {259--284}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9705-3}, doi = {10.1007/S10623-012-9705-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bruyn13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BurattiPW13, author = {Marco Buratti and Anita Pasotti and Dianhua Wu}, title = {On optimal (v, 5, 2, 1) optical orthogonal codes}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {349--371}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9654-x}, doi = {10.1007/S10623-012-9654-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BurattiPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CardinaliP13, author = {Ilaria Cardinali and Antonio Pasini}, title = {On certain forms and quadrics related to symplectic dual polar spaces in characteristic 2}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {229--258}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9602-1}, doi = {10.1007/S10623-011-9602-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CardinaliP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenF13, author = {Yu Qing Chen and Tao Feng}, title = {Abelian and non-abelian Paley type group schemes}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {141--154}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9640-3}, doi = {10.1007/S10623-012-9640-3}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Coolsaet13, author = {Kris Coolsaet}, title = {On the classification of nonsingular 2{\texttimes}2{\texttimes}2{\texttimes}2 hypercubes}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {179--194}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9737-8}, doi = {10.1007/S10623-012-9737-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Coolsaet13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DankelmannKR13, author = {Peter Dankelmann and Jennifer D. Key and Bernardo Gabriel Rodrigues}, title = {Codes from incidence matrices of graphs}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {373--393}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9594-x}, doi = {10.1007/S10623-011-9594-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DankelmannKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dempwolff13, author = {Ulrich Dempwolff}, title = {More translation planes and semifields from Dembowski-Ostrom polynomials}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {81--103}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9709-z}, doi = {10.1007/S10623-012-9709-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dempwolff13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FeulnerSSW13, author = {Thomas Feulner and Lin Sok and Patrick Sol{\'{e}} and Alfred Wassermann}, title = {Towards the classification of self-dual bent functions in eight variables}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {395--406}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9740-0}, doi = {10.1007/S10623-012-9740-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FeulnerSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhinelliHJT13, author = {Dina Ghinelli and James W. P. Hirschfeld and Dieter Jungnickel and Joseph A. Thas}, title = {Editorial: Finite geometries}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9781-4}, doi = {10.1007/S10623-012-9781-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhinelliHJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GiuliettiK13, author = {Massimo Giulietti and G{\'{a}}bor Korchm{\'{a}}ros}, title = {Arcs in AG(2, q) determining few directions}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {61--72}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9630-5}, doi = {10.1007/S10623-012-9630-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GiuliettiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GiuliettiKMP13, author = {Massimo Giulietti and G{\'{a}}bor Korchm{\'{a}}ros and Stefano Marcugini and Fernanda Pambianco}, title = {Transitive {A} 6-invariant k-arcs in PG(2, q)}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {73--79}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9619-0}, doi = {10.1007/S10623-012-9619-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GiuliettiKMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Glynn13, author = {David G. Glynn}, title = {Permanent formulae from the Veronesean}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {39--47}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9618-1}, doi = {10.1007/S10623-012-9618-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Glynn13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Glynn13a, author = {David G. Glynn}, title = {Nonfactorizable nonsingular hypercubes}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {195--203}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9585-y}, doi = {10.1007/S10623-011-9585-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Glynn13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HonoldK13, author = {Thomas Honold and Michael Kiermaier}, title = {The existence of maximal (q 2, 2)-arcs in projective Hjelmslev planes over chain rings of length 2 and odd prime characteristic}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {105--126}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9653-y}, doi = {10.1007/S10623-012-9653-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HonoldK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelT13, author = {Dieter Jungnickel and Vladimir D. Tonchev}, title = {New invariants for incidence structures}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {163--177}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9636-z}, doi = {10.1007/S10623-012-9636-Z}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KasikovaM13, author = {Anna Kasikova and Hendrik Van Maldeghem}, title = {Vertex opposition in spherical buildings}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {285--318}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9643-0}, doi = {10.1007/S10623-012-9643-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KasikovaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lavrauw13, author = {Michel Lavrauw}, title = {Finite semifields and nonsingular tensors}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {205--227}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9710-6}, doi = {10.1007/S10623-012-9710-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lavrauw13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MarutaO13, author = {Tatsuya Maruta and Yusuke Oya}, title = {On the minimum length of ternary linear codes}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {407--425}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9593-y}, doi = {10.1007/S10623-011-9593-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MarutaO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PepeM13, author = {Valentina Pepe and Hendrik Van Maldeghem}, title = {Lax embeddings of the Hermitian unital}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {325--347}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9571-4}, doi = {10.1007/S10623-011-9571-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PepeM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PolhillDS13, author = {John B. Polhill and James A. Davis and Ken Smith}, title = {A new product construction for partial difference sets}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {155--161}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9616-3}, doi = {10.1007/S10623-012-9616-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PolhillDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Rodgers13, author = {Morgan Rodgers}, title = {Cameron-Liebler line classes}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {33--37}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9581-2}, doi = {10.1007/S10623-011-9581-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Rodgers13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SziklaiV13, author = {P{\'{e}}ter Sziklai and Geertrui Van de Voorde}, title = {A small minimal blocking set in PG(n, pt), spanning a (t-1)-space, is linear}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {25--32}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9751-x}, doi = {10.1007/S10623-012-9751-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SziklaiV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Thas13, author = {Koen Thas}, title = {Local half Moufang quadrangles}, journal = {Des. Codes Cryptogr.}, volume = {68}, number = {1-3}, pages = {319--324}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9588-8}, doi = {10.1007/S10623-011-9588-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Thas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.