


default search action
2. ICMCTA 2008: Castillo de la Mota, Medina del Campo, Spain
- Angela I. Barbero:

Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings. Lecture Notes in Computer Science 5228, Springer 2008, ISBN 978-3-540-87447-8 - Rudolf Ahlswede, Faina I. Solov'eva:

A Diametric Theorem in Z nm for Lee and Related Distances. 1-10 - Sergey V. Avgustinovich, Ivan Yu. Mogilnykh:

Perfect 2-Colorings of Johnson Graphs J(6, 3) and J(7, 3). 11-19 - Peter Beelen, Tom Høholdt:

A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm. 20-32 - José Joaquín Bernal

, Ángel del Río, Juan Jacobo Simón:
How to Know if a Linear Code Is a Group Code?. 33-36 - Gérard D. Cohen, Hugues Randriam, Gilles Zémor

:
Witness Sets. 37-45 - Cristina Fernández-Córdoba

, Jaume Pujol, Mercè Villanueva
:
On Rank and Kernel of Z4-Linear Codes. 46-55 - Santos González, Consuelo Martínez, Alejandro Piñera-Nicolás

:
Classic and Quantum Error Correcting Codes. 56-68 - Ana Granados

, Manuel Cebrián
, David Camacho
, Francisco B. Rodríguez
:
Evaluating the Impact of Information Distortion on Normalized Compression Distance. 69-79 - Tom Høholdt:

Codes from Expander Graphs. 80-81 - Joakim Grahl Knudsen, Constanza Riera, Matthew Geoffrey Parker, Eirik Rosnes:

Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation. 82-94 - Margreta Kuijper

, Raquel Pinto
:
Minimal Trellis Construction for Finite Support Convolutional Ring Codes. 95-106 - Carlos Alberto López-Andrade

, Horacio Tapia-Recillas:
On the Quasi-cyclicity of the Gray Map Image of a Class of Codes over Galois Rings. 107-116 - Carlos Munuera

, Alonso Sepúlveda
, Fernando Torres:
Algebraic Geometry Codes from Castle Curves. 117-127 - Carlos Munuera

, Guilherme C. Tizziotti
, Fernando Torres:
Two-Point Codes on Norm-Trace Curves. 128-136 - Matthew Geoffrey Parker:

Close Encounters with Boolean Functions of Three Different Kinds. 137-153 - Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland

:
Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. 154-162 - Josep Rifà

, Victor A. Zinoviev:
On the Kronecker Product Construction of Completely Transitive q-Ary Codes. 163-170 - Ludo M. G. M. Tolhuizen:

Quaternary Unequal Error Protection Codes. 171-185 - Øyvind Ytrehus:

Communication on Inductively Coupled Channels: Overview and Challenges. 186-195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














