Abstract
No abstract available.
Cited By
- Cai H, Miao Y, Schwartz M and Tang X (2025). Repairing Schemes for Tamo-Barg Codes, IEEE Transactions on Information Theory, 71:1, (227-243), Online publication date: 1-Jan-2025.
- Wu H, Yang J and Feng K (2023). The Weight Distributions of Two Classes of Linear Codes From Perfect Nonlinear Functions, IEEE Transactions on Information Theory, 70:6, (4102-4109), Online publication date: 1-Jun-2024.
- Dinh H, Le H, Nguyen B and Maneejuk P (2024). δ-dual codes over finite commutative semi-simple rings, Applicable Algebra in Engineering, Communication and Computing, 35:3, (315-335), Online publication date: 1-May-2024.
- Dinh H, Nguyen B and Tansuchat R (2023). Quantum MDS and synchronizable codes from cyclic codes of length over , Applicable Algebra in Engineering, Communication and Computing, 34:6, (931-964), Online publication date: 1-Nov-2023.
- Ahmad H and Hannusch C A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments Codes, Cryptology and Information Security, (129-135)
- Dinh H, Kumar N, Singh A, Singh M, Gupta I and Maneejuk P (2023). On the symbol-pair distance of some classes of repeated-root constacyclic codes over Galois ring, Applicable Algebra in Engineering, Communication and Computing, 34:1, (111-128), Online publication date: 1-Jan-2023.
- Huffman W, Kim J and Solé P (2022). Guest editorial: On coding theory and combinatorics—in memory of Vera Pless, Designs, Codes and Cryptography, 90:11, (2517-2527), Online publication date: 1-Nov-2022.
- Shi M, Wang S, Helleseth T and Solé P (2022). Quadratic residue codes, rank three groups and PBIBDs, Designs, Codes and Cryptography, 90:11, (2599-2611), Online publication date: 1-Nov-2022.
- Dinh H, Le H, Nguyen B and Tansuchat R (2021). Quantum MDS and synchronizable codes from cyclic and negacyclic codes of length over , Quantum Information Processing, 20:11, Online publication date: 1-Nov-2021.
- Sriwirach W and Klin-eam C (2020). Repeated-root constacyclic codes of length 2p over , Cryptography and Communications, 13:1, (27-52), Online publication date: 1-Jan-2021.
- Mesnager S, Kim K and Jo M (2019). On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions, Cryptography and Communications, 12:4, (659-674), Online publication date: 1-Jul-2020.
- Davydov A, Marcugini S and Pambianco F Bounds for Complete Arcs in and Covering Codes of Radius 3, Codimension 4, Under a Certain Probabilistic Conjecture Computational Science and Its Applications – ICCSA 2020, (107-122)
- Dinh H, Nguyen B and Sriboonchitta S (2019). MDS Symbol-Pair Cyclic Codes of Length
$2p^s$ $\mathbb F_{p^m}$ - Shi M, Liu Y, Randriam H, Sok L and Solé P (2019). Trace codes over $${\mathbb {Z}}_4,$$Z4, and Boolean functions, Designs, Codes and Cryptography, 87:6, (1447-1455), Online publication date: 1-Jun-2019.
- Wolfmann J (2018). Three-weight codes and near-bent functions from two-weight codes, Applicable Algebra in Engineering, Communication and Computing, 29:6, (513-528), Online publication date: 1-Dec-2018.
- Liu H and Maouche Y (2017). Some Repeated-Root Constacyclic Codes Over Galois Rings, IEEE Transactions on Information Theory, 63:10, (6247-6255), Online publication date: 1-Oct-2017.
- Khaled A, Abdel-Ghaffar and Weber J Bounds for cooperative locality using generalized hamming weights 2017 IEEE International Symposium on Information Theory (ISIT), (699-703)
- Ghosh P, Jagadeesan N, Sakulkar P and Krishnamachari B LOCO: A Location Based Communication Scheme Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, (311-316)
- Guerrini E, Meneghetti A and Sala M (2016). On Optimal Nonlinear Systematic Codes, IEEE Transactions on Information Theory, 62:6, (3103-3112), Online publication date: 1-Jun-2016.
- Peterlongo P, Sala M and Tinnirello C (2016). A discrete logarithm-based approach to compute low-weight multiples of binary polynomials, Finite Fields and Their Applications, 38:C, (57-71), Online publication date: 1-Mar-2016.
- Cruz J, Kiermaier M and Wassermann A (2016). The automorphism group of an extremal [120, 60, 24] code does not contain elements of order 29, Designs, Codes and Cryptography, 78:3, (693-702), Online publication date: 1-Mar-2016.
- Bernal J, Bueno-Carreno D and Simon J (2016). Apparent Distance and a Notion of BCH Multivariate Codes, IEEE Transactions on Information Theory, 62:2, (655-668), Online publication date: 1-Feb-2016.
- Chen B, Dinh H, Liu H and Wang L (2016). Constacyclic codes of length 2ps over F p m + u F p m, Finite Fields and Their Applications, 37:C, (108-130), Online publication date: 1-Jan-2016.
- Liu J, Mesnager S and Chen L Secret Sharing Schemes with General Access Structures Revised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 9589, (341-360)
- Guruswami V, Sudan M, Velingker A and Wang C Limitations on testable affine-invariant codes in the high-rate regime Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1312-1325)
- Dinh H, Wang L and Zhu S (2015). Negacyclic codes of length 2 p s over F p m + u F p m, Finite Fields and Their Applications, 31:C, (178-201), Online publication date: 1-Jan-2015.
- Paetznick A and Reichardt B (2012). Fault-tolerant ancilla preparation and noise threshold lower boudds for the 23-qubit Golay code, Quantum Information & Computation, 12:11-12, (1034-1080), Online publication date: 1-Nov-2012.
- Pott A and Zhou Y Switching construction of planar functions on finite fields Proceedings of the Third international conference on Arithmetic of finite fields, (135-150)
- Gadouleau M and Yan Z (2010). Packing and covering properties of subspace codes for error control in random linear network coding, IEEE Transactions on Information Theory, 56:5, (2097-2108), Online publication date: 1-May-2010.
- Bouyuklieva S, Malevich A and Willems W (2010). Automorphisms of extremal self-dual codes, IEEE Transactions on Information Theory, 56:5, (2091-2096), Online publication date: 1-May-2010.
- Drakakis K, Requena V and McGuire G (2010). On the nonlinearity of exponential welch costas functions, IEEE Transactions on Information Theory, 56:3, (1230-1238), Online publication date: 1-Mar-2010.
- Dougherty S, Kim J and Liu H (2010). Constructions of self-dual codes over finite commutative chain rings, International Journal of Information and Coding Theory, 1:2, (171-190), Online publication date: 1-Mar-2010.
- Dinh H (2009). Constacyclic codes of length 2sover Galois extension rings of F2 + uF2, IEEE Transactions on Information Theory, 55:4, (1730-1740), Online publication date: 1-Apr-2009.
- Li C, Li Q and Ling S (2009). Properties and applications of preimage distributions of perfect nonlinear functions, IEEE Transactions on Information Theory, 55:1, (64-69), Online publication date: 1-Jan-2009.
- Kelarev A (2007). Algorithms for computing parameters of graph-based extensions of BCH codes, Journal of Discrete Algorithms, 5:3, (553-563), Online publication date: 1-Sep-2007.
- Konstantinidis S (2007). Computing the edit distance of a regular language, Information and Computation, 205:9, (1307-1316), Online publication date: 1-Sep-2007.
- Singelée D and Preneel B Distance bounding in noisy environments Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (101-115)
- Grolmusz V (2006). Pairs of codes with prescribed Hamming distances and coincidences, Designs, Codes and Cryptography, 41:1, (87-99), Online publication date: 1-Oct-2006.
- Kelarev A A polynomial algorithm for codes based on directed graphs Proceedings of the Twelfth Computing: The Australasian Theory Symposium - Volume 51, (87-92)
- Kelarev A A polynomial algorithm for codes based on directed graphs Proceedings of the 12th Computing: The Australasian Theroy Symposium - Volume 51, (87-92)
- Cheon E, Kato T and Kim S (2005). On the Minimum Length of some Linear Codes of Dimension 5, Designs, Codes and Cryptography, 37:3, (421-434), Online publication date: 1-Dec-2005.
- Zanten A and Suparta I (2005). On the Construction of Linear q-ary Lexicodes, Designs, Codes and Cryptography, 37:1, (15-29), Online publication date: 1-Oct-2005.
- Kroll H and Vincenti R (2005). PD-sets for the codes related to some classical varieties, Discrete Mathematics, 301:1, (89-105), Online publication date: 1-Sep-2005.
- Cheon E, Kato T and Kim S (2005). Nonexistence of [n, 5, d]q Codes Attaining the Griesmer Bound for q4 - 2q2 - 2q + 1 ≤ d ≤ q4 - 2q2 - q, Designs, Codes and Cryptography, 36:3, (289-299), Online publication date: 1-Sep-2005.
- Mullen G (2005). Editorial, Finite Fields and Their Applications, 11:3, (321-325), Online publication date: 1-Aug-2005.
- Shiromoto K Second support weights for binary self-dual codes Proceedings of the 2005 international conference on Coding and Cryptography, (1-13)
- Carlet C and Ding C (2004). Highly nonlinear mappings, Journal of Complexity, 20:2-3, (205-244), Online publication date: 1-Apr-2004.
- Kim J and Lee Y (2004). Euclidean and hermitian self-dual MDS codes over large finite fields, Journal of Combinatorial Theory Series A, 105:1, (79-95), Online publication date: 1-Jan-2004.
- Kim J and Pless V (2003). Designs in Additive Codes over GF(4), Designs, Codes and Cryptography, 30:2, (187-199), Online publication date: 1-Sep-2003.
- Encheva S and Cohen G Copyright control and separating systems Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes, (79-86)
- Pieprzyk J and Zhang X Ideal threshold schemes from MDS codes Proceedings of the 5th international conference on Information security and cryptology, (253-263)
- Véron P (2001). True Dimension of Some Binary Quadratic Trace Goppa Codes, Designs, Codes and Cryptography, 24:1, (81-97), Online publication date: 13-Aug-2001.
- Key J and Mattson H (1999). Edward F. Assmus, Jr. (1931–1998), Designs, Codes and Cryptography, 17:1-3, (7-11), Online publication date: 1-Sep-1999.
Recommendations
Multi-view video coding based on high efficiency video coding
PSIVT'11: Proceedings of the 5th Pacific Rim conference on Advances in Image and Video Technology - Volume Part IIMultiview video coding is one of the key techniques to realize the 3D video system. MPEG started a standardization activity on 3DVC (3D video coding) in 2007. 3DVC is based on multiview video coding. MPEG finalized the standard for multiview video coding ...