Search

Showing total 101 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic codes Remove constraint Topic: codes Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
101 results

Search Results

1. Torn-Paper Coding.

2. Constructions of MDS, Near MDS and Almost MDS Codes From Cyclic Subgroups of F* q 2.

3. Weight Enumerators and Cardinalities for Number-Theoretic Codes.

4. Sequential Transmission Over Binary Asymmetric Channels With Feedback.

5. Almost Optimal Construction of Functional Batch Codes Using Extended Simplex Codes.

6. A Galois Connection Approach to Wei-Type Duality Theorems.

7. Improved Bounds for (b, k)-Hashing.

8. Improved Rank-Modulation Codes for DNA Storage With Shotgun Sequencing.

9. The Subfield Codes of Some [ q + 1, 2, q ] MDS Codes.

10. Shortened Linear Codes From APN and PN Functions.

11. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

12. On Infinite Families of Narrow-Sense Antiprimitive BCH Codes Admitting 3-Transitive Automorphism Groups and Their Consequences.

13. The q -Ary Antiprimitive BCH Codes.

14. Complete Characterization of Gorbunov and Pinsker Nonanticipatory Epsilon Entropy of Multivariate Gaussian Sources: Structural Properties.

15. Combination Networks With End-User-Caches: Novel Achievable and Converse Bounds Under Uncoded Cache Placement.

16. Generalized Pair Weights of Linear Codes and Linear Isomorphisms Preserving Pair Weights.

17. Fundamental Limits of Distributed Linear Encoding.

18. Criss-Cross Insertion and Deletion Correcting Codes.

19. Leakage-Resilient Secret Sharing With Constant Share Size.

20. MDS, Near-MDS or 2-MDS Self-Dual Codes via Twisted Generalized Reed-Solomon Codes.

21. List Decoding Random Euclidean Codes and Infinite Constellations.

22. Binary [ n , (n + 1)/2] Cyclic Codes With Good Minimum Distances.

23. Lower Bounds for Maximally Recoverable Tensor Codes and Higher Order MDS Codes.

24. State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks.

25. Secret Key-Enabled Authenticated-Capacity Region, Part—II: Typical-Authentication.

26. Duality Between Source Coding With Quantum Side Information and Classical-Quantum Channel Coding.

27. Simple Coding Techniques for Many-Hop Relaying.

28. Nonlinearity and Kernel of Z-Linear Simplex and MacDonald Codes.

29. Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication.

30. Construction of Expurgated and Extended Goppa Codes With Dihedral Automorphism Groups.

31. 1-Perfect Codes Over the Quad-Cube.

32. Zero-Error Feedback Capacity for Bounded Stabilization and Finite-State Additive Noise Channels.

33. Distribution of the Minimum Distance of Random Linear Codes.

34. Streaming Codes for Variable-Size Messages.

35. The Secret Arithmetic of Patterns: A General Method for Designing Constrained Codes Based on Lexicographic Indexing.

36. Optimal Age Over Erasure Channels.

37. The Subfield Codes and Subfield Subcodes of a Family of MDS Codes.

38. Ouroboros: An Efficient and Provably Secure KEM Family.

39. Enumeration of Extended Irreducible Binary Goppa Codes.

40. Q -Ary Non-Overlapping Codes: A Generating Function Approach.

41. Coordinate-Ordering-Free Upper Bounds for Linear Insertion-Deletion Codes.

42. Sparse and Balanced MDS Codes Over Small Fields.

43. Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints.

44. A Subfield-Based Construction of Optimal Linear Codes Over Finite Fields.

45. Polar Codes for Quantum Reading.

46. Construction of Optimal (r , δ)-Locally Recoverable Codes and Connection With Graph Theory.

47. Systematic Encoding and Permutation Decoding for Z p s -Linear Codes.

48. Infinite Families of 3-Designs and 2-Designs From Almost MDS Codes.

49. Two New Families of Quadratic APN Functions.

50. A Bound on Undirected Multiple-Unicast Network Information Flow.