{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T06:53:37Z","timestamp":1697612017632},"reference-count":21,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":4626,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Eur. Trans. Telecomm."],"published-print":{"date-parts":[[2003,9]]},"DOI":"10.1002\/ett.939","type":"journal-article","created":{"date-parts":[[2003,12,8]],"date-time":"2003-12-08T08:01:03Z","timestamp":1070870463000},"page":"399-409","source":"Crossref","is-referenced-by-count":9,"title":["Regular low-density parity-check codes from oval designs"],"prefix":"10.1002","volume":"14","author":[{"given":"Steven R.","family":"Weller","sequence":"first","affiliation":[]},{"given":"Sarah J.","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2003]]},"reference":[{"key":"10.1002\/ett.939-BIB1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"IT-8","author":"Gallager","year":"1962","journal-title":"IRE Transctions on Information Theory"},{"key":"10.1002\/ett.939-BIB2","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1049\/el:19961141","volume":"32","author":"MacKay","year":"1996","journal-title":"Electronic Letters"},{"key":"10.1002\/ett.939-BIB3","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TIT.1981.1056404","volume":"IT-27","author":"Tanner","year":"1981","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1002\/ett.939-BIB4","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1109\/18.748992","volume":"45","author":"MacKay","year":"1999","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1002\/ett.939-BIB5","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/26.848552","volume":"48","author":"Lucas","year":"2000","journal-title":"IEEE Transactions on Communications"},{"key":"10.1002\/ett.939-BIB6","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/49.661103","volume":"16","author":"McEliece","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1002\/ett.939-BIB7","first-page":"113","volume-title":"Codes, Systems and Graphical Models","author":"MacKay","year":"2000","unstructured":"Evaluation of Gallager codes for short block length and high rate applications. In Codes, Systems and Graphical Models, Volume 123 of IMA Volumes in Mathematics and its Applications. (eds). Springer-Verlag: New York, 2000; pp. 113-130. Available at http:\/\/wol.ra.phy.cam.ac.uk\/mackay\/CodesRegular.html"},{"key":"10.1002\/ett.939-BIB8","author":"Johnson","year":"2001","unstructured":"Regular low-density parity-check codes from combinatorial designs. In Proceedings of IEEE Information Theory Workshop, Cairns, Australia, September 2001, pp. 90-92."},{"key":"10.1002\/ett.939-BIB9","author":"Johnson","year":"2001","unstructured":"Construction of low-density parity-check codes from Kirkman triple systems. In Proceedings of IEEE Globecom Conference, San Antonio, TX, November 2001, pp. 970-974."},{"key":"10.1002\/ett.939-BIB10","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/TCOMM.2003.816946","volume":"51","author":"Johnson","year":"2003","journal-title":"IEEE Transactions on Communication"},{"key":"10.1002\/ett.939-BIB11","author":"Kou","year":"2000","unstructured":"Low-density parity-check codes: Construction based on finite geometries. In Proceedings of IEEE Globecom Conference, San Francisco, CA, November 2000, pp. 825-829."},{"key":"10.1002\/ett.939-BIB12","doi-asserted-by":"crossref","first-page":"2711","DOI":"10.1109\/18.959255","volume":"47","author":"Kou","year":"2001","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1002\/ett.939-BIB13","volume-title":"Designs and Their Codes","author":"Assmus","year":"1993","unstructured":"Designs and Their Codes. Vol. 103 of Cambridge Tracts in Mathematics. Cambridge University Press: Cambridge, 1993."},{"key":"10.1002\/ett.939-BIB14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1023\/A:1027337923268","volume":"9","author":"Carpenter","year":"1996","journal-title":"Designs, Codes and Cryptography"},{"key":"10.1002\/ett.939-BIB15","doi-asserted-by":"crossref","DOI":"10.21236\/AD0407946","volume-title":"Threshold Decoding","author":"Massey","year":"1963","unstructured":"Threshold Decoding. M.I.T. Press: Cambridge, Massachusetts, 1963."},{"key":"10.1002\/ett.939-BIB16","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"Bosma","year":"1997","journal-title":"Journal of Symbolic Computation"},{"key":"10.1002\/ett.939-BIB17","author":"Neal","year":"2001","unstructured":"www.cs.toronto.edu\/radford\/homepage.html December 2001."},{"key":"10.1002\/ett.939-BIB18","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1109\/49.924874","volume":"19","author":"Fossorier","year":"2001","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1002\/ett.939-BIB19","volume-title":"Combinatorial Designs: Construction Methods, Mathematics and its Applications","author":"Anderson","year":"1990","unstructured":"Combinatorial Designs: Construction Methods, Mathematics and its Applications. Ellis Horwood, Chichester, 1990."},{"key":"10.1002\/ett.939-BIB20","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1090\/S0002-9947-1960-0111695-3","volume":"95","author":"Bose","year":"1960","journal-title":"Transactions of American Mathematical Society"},{"key":"10.1002\/ett.939-BIB21","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1006\/jsco.1999.1007","volume":"31","author":"Key","year":"2001","journal-title":"Journal of Symbolic Computation"}],"container-title":["European Transactions on Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T05:37:19Z","timestamp":1625290639000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2003,9]]}},"URL":"https:\/\/doi.org\/10.1002\/ett.939","relation":{},"ISSN":["1124-318X","1541-8251"],"issn-type":[{"value":"1124-318X","type":"print"},{"value":"1541-8251","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}