Buch, Englisch, 197 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 324 g
2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings
Buch, Englisch, 197 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 324 g
Reihe: Theoretical Computer Science and General Issues
ISBN: 978-3-540-87447-8
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik Mathematik Algebra Homologische Algebra
- Mathematik | Informatik Mathematik Numerik und Wissenschaftliches Rechnen Angewandte Mathematik, Mathematische Modelle
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Informatik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik Mathematik Geometrie Algebraische Geometrie
Weitere Infos & Material
A Diametric Theorem in for Lee and Related Distances.- Perfect 2-Colorings of Johnson Graphs J(6,3) and J(7,3).- A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm.- How to Know if a Linear Code Is a Group Code?.- Witness Sets.- On Rank and Kernel of ?4-Linear Codes.- Classic and Quantum Error Correcting Codes.- Evaluating the Impact of Information Distortion on Normalized Compression Distance.- Codes from Expander Graphs.- Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation.- Minimal Trellis Construction for Finite Support Convolutional Ring Codes.- On the Quasi-cyclicity of the Gray Map Image of a Class of Codes over Galois Rings.- Algebraic Geometry Codes from Castle Curves.- Two-Point Codes on Norm-Trace Curves.- Close Encounters with Boolean Functions of Three Different Kinds.- Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization.- On the Kronecker Product Construction of Completely Transitive q-Ary Codes.- Quaternary Unequal Error Protection Codes.- Communication on Inductively Coupled Channels: Overview and Challenges.