{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:11:39Z","timestamp":1729663899981,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/itw.2014.6970808","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T17:35:43Z","timestamp":1418060143000},"page":"137-141","source":"Crossref","is-referenced-by-count":2,"title":["Relative generalized Hamming weights of one-point algebraic geometric codes"],"prefix":"10.1109","author":[{"given":"Olav","family":"Geil","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Ryutaroh","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Ruano","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.133259"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3810-9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1987.1057327"},{"key":"ref30","article-title":"MDS codes on the erasure-erasure wiretap channel","author":"subramanian","year":"2009","journal-title":"arXiv preprint arXiv 0902 3286"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0087995"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/ecja.4410690906"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/18.476241"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/18.340452"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2014.05.006"},{"key":"ref13","article-title":"An improvement of the Feng-Rao bound for primary codes","author":"geil","year":"2014","journal-title":"Des Codes Cryptogr"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2345375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2013.03.005"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"489","DOI":"10.3934\/amc.2011.5.489","article-title":"On the order bounds for one-point AG codes","volume":"5","author":"geil","year":"2011","journal-title":"Adv Math Commun"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1006\/ffta.2001.0347"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11617983_29"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/18.651015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2003.10.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-2786-5_20"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/S089548019834342X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11565-008-0037-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/18.21267"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-540-72540-4_17","article-title":"Secure computation from random error correcting codes","volume":"4515","author":"chen","year":"2007","journal-title":"Advances in Cryptology-Eurocrypt 2007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.179340"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2009.11.006"},{"article-title":"Generalized Hamming weights and their applications to secret sharing schemes","year":"2008","author":"bains","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.335972"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2006.12.004"},{"key":"ref20","first-page":"871","article-title":"Algebraic geometry codes","volume":"1","author":"h\u00f8holdt","year":"1998","journal-title":"Handbook of Coding Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E95.A.2067"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF01443420"},{"key":"ref24","first-page":"926","article-title":"On the Feng-Rao bound for the &#x00A3;-construction of algebraic geometry codes","volume":"e83 a","author":"matsumoto","year":"2000","journal-title":"IEICE Trans Fundamentals"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.842763"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1006\/ffta.2000.0283"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/18.749019"}],"event":{"name":"2014 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2014,11,2]]},"location":"Hobart, Australia","end":{"date-parts":[[2014,11,5]]}},"container-title":["2014 IEEE Information Theory Workshop (ITW 2014)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6963754\/6970773\/06970808.pdf?arnumber=6970808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:45:18Z","timestamp":1498167918000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6970808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":35,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/itw.2014.6970808","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}