


Остановите войну!
for scientists:


default search action
2. ICMCTA 2008: Castillo de la Mota, Medina del Campo, Spain
- Angela I. Barbero:
Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings. Lecture Notes in Computer Science 5228, Springer 2008, ISBN 978-3-540-87447-8 - Rudolf Ahlswede, Faina I. Solov'eva:
A Diametric Theorem in Z nm for Lee and Related Distances. 1-10 - Sergey V. Avgustinovich, Ivan Yu. Mogilnykh:
Perfect 2-Colorings of Johnson Graphs J(6, 3) and J(7, 3). 11-19 - Peter Beelen, Tom Høholdt:
A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm. 20-32 - José Joaquín Bernal, Ángel del Río, Juan Jacobo Simón:
How to Know if a Linear Code Is a Group Code?. 33-36 - Gérard D. Cohen, Hugues Randriam, Gilles Zémor
:
Witness Sets. 37-45 - Cristina Fernández-Córdoba
, Jaume Pujol, Mercè Villanueva
:
On Rank and Kernel of Z4-Linear Codes. 46-55 - Santos González, Consuelo Martínez, Alejandro Piñera-Nicolás
:
Classic and Quantum Error Correcting Codes. 56-68 - Ana Granados
, Manuel Cebrián, David Camacho
, Francisco B. Rodríguez:
Evaluating the Impact of Information Distortion on Normalized Compression Distance. 69-79 - Tom Høholdt:
Codes from Expander Graphs. 80-81 - Joakim Grahl Knudsen, Constanza Riera, Matthew Geoffrey Parker, Eirik Rosnes:
Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation. 82-94 - Margreta Kuijper
, Raquel Pinto
:
Minimal Trellis Construction for Finite Support Convolutional Ring Codes. 95-106 - Carlos Alberto López-Andrade
, Horacio Tapia-Recillas:
On the Quasi-cyclicity of the Gray Map Image of a Class of Codes over Galois Rings. 107-116 - Carlos Munuera
, Alonso Sepúlveda
, Fernando Torres:
Algebraic Geometry Codes from Castle Curves. 117-127 - Carlos Munuera
, Guilherme C. Tizziotti
, Fernando Torres:
Two-Point Codes on Norm-Trace Curves. 128-136 - Matthew Geoffrey Parker:
Close Encounters with Boolean Functions of Three Different Kinds. 137-153 - Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland
:
Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. 154-162 - Josep Rifà
, Victor A. Zinoviev:
On the Kronecker Product Construction of Completely Transitive q-Ary Codes. 163-170 - Ludo M. G. M. Tolhuizen:
Quaternary Unequal Error Protection Codes. 171-185 - Øyvind Ytrehus:
Communication on Inductively Coupled Channels: Overview and Challenges. 186-195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.