{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:42:21Z","timestamp":1725604941110},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664370","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"693-697","source":"Crossref","is-referenced-by-count":1,"title":["Shortened Cyclic Codes for Correcting and Detecting Burst Errors"],"prefix":"10.23919","author":[{"given":"Roy D.","family":"Cideciyan","sequence":"first","affiliation":[]},{"given":"Simeon","family":"Furrer","sequence":"additional","affiliation":[]},{"given":"Mark A.","family":"Lantz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Bounds on burst error correcting codes","author":"campopiano","year":"1961","journal-title":"Radio Corporation of America Airborne Systems Division EM-60-597-20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057711"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054265"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2006.06.021"},{"key":"ref14","first-page":"1","article-title":"IEEE Standard for Ethernet","year":"2016","journal-title":"IEEE Std 802 3-2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/26.35380"},{"key":"ref16","article-title":"Double burst error detection capability of Ethernet CRC","author":"cideciyan","year":"0","journal-title":"IEEE 802 3ba Task Force Meeting"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048454"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511800467","author":"blahut","year":"2003","journal-title":"Algebraic Codes for Data Transmission"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928287"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/26.231911"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056193"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21236\/ADA013939"},{"key":"ref3","article-title":"A class of multiple-error-correcting binary codes for non-independent errors","author":"fire","year":"1959","journal-title":"Reconnaissance Syst Lab Mountain View CA USA Sylvania Rep RSL-E-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1963.1057825"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/26.275293"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2597211"},{"key":"ref8","article-title":"Error-correcting codes from linear sequential circuits","author":"abramson","year":"1960","journal-title":"4th Symp on Information Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1960.1057558"},{"journal-title":"Error Control Coding","year":"2004","author":"lin","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511606267"},{"journal-title":"Error-Correcting Codes","year":"1972","author":"peterson","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055177"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1986.1057242"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.111011.112186"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/18.119712"},{"key":"ref26","article-title":"10GBASE-KR FEC tutorial","author":"szczepanek","year":"0","journal-title":"IEEE 802 Plenary"},{"key":"ref25","article-title":"Update on FEC proposal for 10GbE backplane Ethernet","author":"belegolovy","year":"0","journal-title":"IEEE 802 3ap Task Force"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664370.pdf?arnumber=8664370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:23:30Z","timestamp":1643246610000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664370","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}