{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T03:14:47Z","timestamp":1649128487960},"reference-count":18,"publisher":"EDP Sciences","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["RAIRO-Theor. Inf. Appl."],"published-print":{"date-parts":[[1992]]},"DOI":"10.1051\/ita\/1992260302871","type":"journal-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T15:14:06Z","timestamp":1486048446000},"page":"287-301","source":"Crossref","is-referenced-by-count":1,"title":["Caract\u00e9risation results about $L$ codes"],"prefix":"10.1051","volume":"26","author":[{"given":"J.","family":"Honkala","sequence":"first","affiliation":[]},{"given":"A.","family":"Salomaa","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2011,1,8]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","unstructured":"1. BERSTEL J., Fibonacci Words - A Survey. In G. ROZENBERG and A. SALOMAA Ed. The Book of L, Springer-Verlag, Berlin, Heidelberg, New York, 1986, pp. 13-27.0589.68053","DOI":"10.1007\/978-3-642-95486-3_2"},{"key":"R2","unstructured":"2. BERSTEL J. and PERRIN D., Theory of Codes, Academic Press, New York, 1985.7970690587.68066"},{"key":"R3","unstructured":"3. BRUYERE V., Codes pr\u00e9fixes. Codes a delai de d\u00e9chiffrage borne. Nouvelle th\u00e8se, Universit\u00e9 de Mons, 1989."},{"key":"R4","doi-asserted-by":"crossref","unstructured":"4. CULIK II K. and SALOMAA A., Ambiguity and Decision Problems Conceming Nurnber Systems, Inform. and Control, 1983, 56, pp. 139-153.7355000541.03006","DOI":"10.1016\/S0019-9958(83)80001-1"},{"key":"R5","doi-asserted-by":"crossref","unstructured":"5. EHRENFEUCHT A. and ROZENBERG G., Simplifications of Homomorphisms, Inform. and Control, 1978, 38, pp. 298-309.5095550387.68062","DOI":"10.1016\/S0019-9958(78)90095-5"},{"key":"R6","doi-asserted-by":"crossref","unstructured":"6. FROUGNY C., Linear Numeration Systems of Order Two, Inform. and Comput., 1988, 77, pp. 233-259.9425760648.68066","DOI":"10.1016\/0890-5401(88)90050-8"},{"key":"R7","doi-asserted-by":"crossref","unstructured":"7. HONKALA J., Unique Representation in Number Systems and L Codes, Discrete Appl. Math., 1982, 4, pp. 229-232.6758530537.94024","DOI":"10.1016\/0166-218X(82)90044-0"},{"key":"R8","doi-asserted-by":"crossref","unstructured":"8. HONKALA J., Bases and Ambiguity of Number Systems, Theoret. Comput. Sci., 1984, 31, pp. 61-71.7520940546.68066","DOI":"10.1016\/0304-3975(84)90126-9"},{"key":"R9","doi-asserted-by":"crossref","unstructured":"9. HONKALA J., It is Decidable Whether or Not a Permutation-Free Morphism is an L Code, Int. J. Comput. Math., 1987, 22, pp. 1-11.0684.68091","DOI":"10.1080\/00207168708803578"},{"key":"R10","unstructured":"10. HONKALA J., Regularity Properties of L Ambiguities of Morphisms, \"In the Footsteps of L\", Springer-Verlag (to appear).0766.680791226684"},{"key":"R11","doi-asserted-by":"crossref","unstructured":"11. HONKALA J. and SALOMAA A., L-Morphisms: Bounded Delay and Regularity of Ambiguity, Springer Lecture Notes in Comput. Sci., 1991, 510, pp. 566-574.11299360766.68078","DOI":"10.1007\/3-540-54233-7_164"},{"key":"R12","doi-asserted-by":"crossref","unstructured":"12. DE LUCA A. and RESTIVO A., Star-free Sets of Integers, Theoret. Comput. Sci., 1986, 43, pp. 265-275..8559760597.68060","DOI":"10.1016\/0304-3975(86)90180-5"},{"key":"R13","doi-asserted-by":"crossref","unstructured":"13. MAURER H., SALOMAA A. and WOOD D., L Codes and Number Systems, Theoret. Comput. Sci., 1983, 22, pp. 331-346.6930640531.68027","DOI":"10.1016\/0304-3975(83)90111-1"},{"key":"R14","doi-asserted-by":"crossref","unstructured":"14. MAURER H., SALOMAA A. and WOOD D., Bounded delay L codes, IIG Technical Report 1990, Theoret. Comput. Sci., 1991, 84, pp. 265-279.11181240735.68051","DOI":"10.1016\/0304-3975(91)90163-V"},{"key":"R15","unstructured":"15. SALOMAA A., Jewels of Formal Language Theory, Computer Science Press, Rockville, 1981.6181240487.68064"},{"key":"R16","unstructured":"16. SALOMAA A., L codes: variations on a theme by MSW. In Ten Years IIG, IIG Report, 1988, 260, p. 218."},{"key":"R17","doi-asserted-by":"crossref","unstructured":"17. SALOMAA A., Public-Key Cryptography, Springer-Verlag, Berlin, Heidelberg, New York, 1990.10815410712.68003","DOI":"10.1007\/978-3-662-02627-4"},{"key":"R18","unstructured":"18. SALOMAA A., Cryptographic properties of L codes, in preparation."}],"container-title":["RAIRO - Theoretical Informatics and Applications"],"original-title":[],"link":[{"URL":"http:\/\/www.rairo-ita.org\/10.1051\/ita\/1992260302871\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T06:00:25Z","timestamp":1568786425000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rairo-ita.org\/10.1051\/ita\/1992260302871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"references-count":18,"journal-issue":{"issue":"3"},"alternative-id":["ita1992260302871"],"URL":"https:\/\/doi.org\/10.1051\/ita\/1992260302871","relation":{},"ISSN":["0988-3754","1290-385X"],"issn-type":[{"value":"0988-3754","type":"print"},{"value":"1290-385X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992]]}}}