


default search action
EUROCODE 1990: Udine, Italy
- Gérard D. Cohen, Pascale Charpin:

EUROCODE '90, International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990, Proceedings. Lecture Notes in Computer Science 514, Springer 1991, ISBN 3-540-54303-1
1. Codes
- Thomas H. E. Ericson, Victor A. Zinoviev:

Concatenated spherical codes. 2-5 - Michele Elia, Giorgio Taricco

:
A note on automorphism groups of codes and symbol error probability computation. 6-20 - Thierry P. Berger:

A direct proof for the automorphism group of Reed-Solomon codes. 21-29 - Thomas Beth, Dejan E. Lazic, Vojin Senk:

A family of binary codes with asymptotically good distance distribution. 30-41 - Claude Carlet:

A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes. 42-50 - Philippe Langevin:

Covering radius of RM (1, 9) in RM (3, 9). 51-59 - François Rodier:

The weights of the duals of binary BCH codes of designed distance delta=9. 60-64 - Daniel Augot, Pascale Charpin, Nicolas Sendrier:

The minimum distance of some binary codes via the Newton's identities. 65-73
2. Codes
- J. Burger, Hervé Chabanne, Marc Girault:

Minimum-change binary block-codes which are well balanced. 76-86 - A. O. Mabogunje, Patrick Guy Farrell:

Construction of unequal error protection codes. 87-93 - Gérard D. Cohen, Luisa Gargano

, Ugo Vaccaro:
Unidirectional error-detecting codes. 94-105 - André Montpetit:

Coherent partitions and codes. 106-113 - Annie Astié-Vidal, Vincent Dugat:

(1/lambda)-regular and (1/lambda)-homogeneous tournaments. 114-124
3. Codes
- Dominique Le Brigand:

Decoding of codes on hyperelliptic curves. 126-134 - D. Rotillon, J. A. Thiongly:

Decoding of codes on the Klein Quartic. 135-149 - Conny Voss:

Asymptotically good families of geometric Goppa codes and the Gilbert-Varshamov bound. 150-157 - Marc Perret:

Multiplicative character sums and non linear geometric codes. 158-165
4. Protection of Information
- Marc Girault:

A survey of identification schemes. 168-179 - Sami Harari:

A correlation cryptographic scheme. 180-192 - Jacques Patarin:

Pseudorandom permutations based on the DES scheme. 193-204 - Harriet J. Fell:

Linear complexity of transformed sequences. 205-214 - Guy Chassé:

Some remarks on a LFSR "disturbed" by other sequences. 215-221 - Reiner Creutzburg

:
Paramters for complex FFTs infinite residue class rings. 222-226 - Josep Domingo-Ferrer, Llorenç Huguet i Rotger:

A cryptographic tool for programs protection. 227-240
5. Convolutional Codes
- David Haccoun:

Decoding techniques for convolutional codes. 242-258 - Rémi Sfez, Gerard Battail:

A weighted-output variant of the Viterbi algorithm for concatenated schemes using a convolutional inner code. 259-270 - Renato Baldini Filho, Patrick Guy Farrell:

Coded modulation with convolutional codes over rings. 271-280
6. Information Theory
- Andrea Sgarro:

A Shannon-theoretic coding theorem in authentication theory. 282-291 - Anna Fioretto, Andrea Sgarro:

Joint fractional entropy. 292-297 - Gerard Battail, Mauro Guazzo:

On the adaptive source coding. 298-308 - Renato M. Capocelli, Alfredo De Santis

:
Minimum codeword length and redundancy of Huffman codes. 309-317
7. Modulation
- A. Robert Calderbank:

Binary covering codes and high speed data transmission. 320-336 - Gerard Battail, Hélio Magalhães de Oliveira

, Weidong Zhang:
Coding and modulation for the Gaussian channel, in the absence or in the presence of fluctuations. 337-349 - Rémi Sfez, Jean-Claude Belfiore, K. Leeuwin, A. Fihel:

Comparison of two modulation-coding schemes for low-rate digital land mobile radio communication. 350-363 - K. Leeuwin, Jean-Claude Belfiore, Ghassan Kawas Kaleh:

Chernoff bound of trellis coded modulation over correlated Rayleigh channel. 364-376
8. Applications of Coding
- Marc M. Darmon, Philippe R. Sadot:

A hybrid FEC-ARQ communication system using sequential decoding. 378-384 - Jean-Luc Politano, Dominique Deprey:

A 30 Mbits/s (255, 223) Reed-Solomon decoder. 385-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














