Normal view MARC view ISBD view

Coding Theory and Applications [electronic resource] : 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings / edited by Angela Barbero.

Contributor(s): Barbero, Angela [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Theoretical Computer Science and General Issues: 5228Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008Edition: 1st ed. 2008.Description: VIII, 197 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540874485.Subject(s): Coding theory | Information theory | Algebra | Algebraic geometry | Computer science -- Mathematics | Cryptography | Data encryption (Computer science) | Coding and Information Theory | Algebra | Algebraic Geometry | Symbolic and Algebraic Manipulation | CryptologyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 003.54 Online resources: Click here to access online
Contents:
A Diametric Theorem in for Lee and Related Distances -- Perfect 2-Colorings of Johnson Graphs J(6,3) and J(7,3) -- A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm -- How to Know if a Linear Code Is a Group Code? -- Witness Sets -- On Rank and Kernel of ?4-Linear Codes -- Classic and Quantum Error Correcting Codes -- Evaluating the Impact of Information Distortion on Normalized Compression Distance -- Codes from Expander Graphs -- Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation -- Minimal Trellis Construction for Finite Support Convolutional Ring Codes -- On the Quasi-cyclicity of the Gray Map Image of a Class of Codes over Galois Rings -- Algebraic Geometry Codes from Castle Curves -- Two-Point Codes on Norm-Trace Curves -- Close Encounters with Boolean Functions of Three Different Kinds -- Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization -- On the Kronecker Product Construction of Completely Transitive q-Ary Codes -- Quaternary Unequal Error Protection Codes -- Communication on Inductively Coupled Channels: Overview and Challenges.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 2008. The 14 full papers and 5 invited papers presented were carefully reviewed and selected from 34 submissions for inclusion in the book. The papers cover network coding, quantum codes, group codes, codes and combinatorial structures, agebraic-geometry codes, as well as codes and applications.
    average rating: 0.0 (0 votes)
No physical items for this record

A Diametric Theorem in for Lee and Related Distances -- Perfect 2-Colorings of Johnson Graphs J(6,3) and J(7,3) -- A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm -- How to Know if a Linear Code Is a Group Code? -- Witness Sets -- On Rank and Kernel of ?4-Linear Codes -- Classic and Quantum Error Correcting Codes -- Evaluating the Impact of Information Distortion on Normalized Compression Distance -- Codes from Expander Graphs -- Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation -- Minimal Trellis Construction for Finite Support Convolutional Ring Codes -- On the Quasi-cyclicity of the Gray Map Image of a Class of Codes over Galois Rings -- Algebraic Geometry Codes from Castle Curves -- Two-Point Codes on Norm-Trace Curves -- Close Encounters with Boolean Functions of Three Different Kinds -- Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization -- On the Kronecker Product Construction of Completely Transitive q-Ary Codes -- Quaternary Unequal Error Protection Codes -- Communication on Inductively Coupled Channels: Overview and Challenges.

This book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 2008. The 14 full papers and 5 invited papers presented were carefully reviewed and selected from 34 submissions for inclusion in the book. The papers cover network coding, quantum codes, group codes, codes and combinatorial structures, agebraic-geometry codes, as well as codes and applications.

There are no comments for this item.

Log in to your account to post a comment.