{"id":"https://openalex.org/W1968343968","doi":"https://doi.org/10.1109/tit.1980.1056186","title":"Burst-error-correcting convolutional codes with short constraint length (Corresp.)","display_name":"Burst-error-correcting convolutional codes with short constraint length (Corresp.)","publication_year":1980,"publication_date":"1980-05-01","ids":{"openalex":"https://openalex.org/W1968343968","doi":"https://doi.org/10.1109/tit.1980.1056186","mag":"1968343968"},"language":"en","primary_location":{"id":"doi:10.1109/tit.1980.1056186","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1980.1056186","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090725771","display_name":"W. Rodgers","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"W. Rodgers","raw_affiliation_strings":["AeroSpace and Missile Systems Group 262/C38, Hughes Aircraft Company, Canoga Park, CA, USA","Department of Electrical Engineering, Ohio State Uinversity, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"AeroSpace and Missile Systems Group 262/C38, Hughes Aircraft Company, Canoga Park, CA, USA","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Engineering, Ohio State Uinversity, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002514503","display_name":"R.B. Lackey","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Lackey","raw_affiliation_strings":["Department of Electrical Engineering, Ohio State Uinversity, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Ohio State Uinversity, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090725771"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.06091299,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"3","first_page":"354","last_page":"359"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5296879410743713},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4476656913757324},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42785003781318665},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.42722660303115845},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3845836818218231},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.28475624322891235},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17871052026748657}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5296879410743713},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4476656913757324},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42785003781318665},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.42722660303115845},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3845836818218231},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28475624322891235},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17871052026748657},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.1980.1056186","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1980.1056186","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2043679390","https://openalex.org/W2049638090","https://openalex.org/W2077944678","https://openalex.org/W2130046068","https://openalex.org/W2162823219","https://openalex.org/W2182112064","https://openalex.org/W2806905113"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W4254637722","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2390279801"],"abstract_inverted_index":{"A":[0,102],"new":[1,114],"class":[2],"of":[3,14,43,65,74,110],"<tex":[4,15,19,32,44,66,115],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[5,16,20,33,45,67,116],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">B":[6,117],"1</tex>":[7,50,118],"codes":[8,26,119,132],"which":[9,95,120],"have":[10],"an":[11,108],"information":[12],"rate":[13],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(b-1)/b</tex>":[17],"for":[18,99,125],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">b=2,3,4,":[21],"\\cdots</tex>":[22],"is":[23,53,59,77,82,93,105],"presented.":[24],"These":[25,131],"correct":[27],"error":[28,100],"bursts":[29],"up":[30],"to":[31,84],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">b</tex>":[34,68],"bits":[35,69],"long":[36],"when":[37],"followed":[38],"by":[39,135],"a":[40,56],"guard":[41,127],"space":[42,128],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">3b^{2}":[46],"-":[47,49],"2b":[48],"bits.":[51,88],"It":[52],"assumed":[54],"that":[55],"hard":[57],"decision":[58],"made":[60],"on":[61],"the":[62,75,86,111,122],"fii":[63],"sub-block":[64],"after":[70],"one":[71],"constraint":[72],"length":[73],"code":[76],"received":[78],"and":[79],"then":[80],"feedback":[81],"used":[83],"modify":[85],"syndrome":[87],"One":[89],"simplified":[90],"decodhg":[91],"scheme":[92],"described":[94],"uses":[96],"simple":[97],"logic":[98],"correction.":[101],"detailed":[103],"example":[104],"presented":[106],"showing":[107],"application":[109],"results.":[112],"Several":[113],"meet":[121],"Wyner-Ash":[123],"bound":[124],"minimum":[126],"are":[129],"given.":[130],"were":[133],"found":[134],"computer":[136],"search.":[137]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
