default search action
Search dblp for Publications
export results for "stream:journals/ijicot:"
@article{DBLP:journals/ijicot/FuentesO22, author = {Jes{\'{u}}s Fuentes and Octavio Obreg{\'{o}}n}, title = {Optimisation of information processes using non-extensive entropies without parameters}, journal = {Int. J. Inf. Coding Theory}, volume = {6}, number = {1}, pages = {35--51}, year = {2022}, url = {https://doi.org/10.1504/IJICOT.2021.10041896}, doi = {10.1504/IJICOT.2021.10041896}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/FuentesO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/MengSS22, author = {Xiangrui Meng and Vidya Sagar and Ritumoni Sarma}, title = {Codes with low-dimensional hull}, journal = {Int. J. Inf. Coding Theory}, volume = {6}, number = {1}, pages = {71--86}, year = {2022}, url = {https://doi.org/10.1504/IJICOT.2022.10050374}, doi = {10.1504/IJICOT.2022.10050374}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/MengSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/PakY22, author = {Song Chol Pak and Nam Chol Yu}, title = {A new burst error correcting method for Reed-Solomon codes based on composite parity-check matrices}, journal = {Int. J. Inf. Coding Theory}, volume = {6}, number = {1}, pages = {22--34}, year = {2022}, url = {https://doi.org/10.1504/IJICOT.2022.10050874}, doi = {10.1504/IJICOT.2022.10050874}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/PakY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/PrakashYS22, author = {Om Prakash and Shikha Yadav and Priyanka Sharma}, title = {Reversible cyclic codes over a class of chain rings and their application to {DNA} codes}, journal = {Int. J. Inf. Coding Theory}, volume = {6}, number = {1}, pages = {52--70}, year = {2022}, url = {https://doi.org/10.1504/IJICOT.2021.10049568}, doi = {10.1504/IJICOT.2021.10049568}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/PrakashYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Yardi22, author = {Arti D. Yardi}, title = {Third-party cyclic code reconstruction over binary erasure channel}, journal = {Int. J. Inf. Coding Theory}, volume = {6}, number = {1}, pages = {1--21}, year = {2022}, url = {https://doi.org/10.1504/IJICOT.2022.10050870}, doi = {10.1504/IJICOT.2022.10050870}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Yardi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CalkavurNOZ20, author = {Selda {\c{C}}alkavur and Syed Khalid Nauman and Cenap {\"{O}}zel and Hanifa Zekraoui}, title = {The least-squares solutions in linear codes based multisecret-sharing approach}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {290--302}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110740}, doi = {10.1504/IJICOT.2020.110740}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/CalkavurNOZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/ChakrabartySJDM20, author = {Ratna Chakrabarty and Shuvadip Sutradhar and Sayanti Jana and Argho Dutta and Niranjan Kumar Mandal}, title = {Design of convolution encoder using quantum dot cellular automata}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {227--238}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110736}, doi = {10.1504/IJICOT.2020.110736}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/ChakrabartySJDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DoughertyGKK20, author = {Steven T. Dougherty and Joe Gildea and Adrian Korban and Abidin Kaya}, title = {New extremal self-dual binary codes of length 68 via composite construction, {\unicode{61328}}\({}_{\mbox{2}}\) + \emph{u}{\unicode{61328}}\({}_{\mbox{2}}\) lifts, extensions and neighbours}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {211--226}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110703}, doi = {10.1504/IJICOT.2020.110703}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DoughertyGKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DoughertyY20, author = {Steven T. Dougherty and Bahattin Yildiz}, title = {Linear transformation codes: codes with a compact description and transpoliser codes}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {185--197}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110707}, doi = {10.1504/IJICOT.2020.110707}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/DoughertyY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/IslamVP20, author = {Habibul Islam and Ram Krishna Verma and Om Prakash}, title = {A family of constacyclic codes over {\unicode{61328}}\({}_{\mbox{\emph{p\({}^{\mbox{m}}\)}}}\) [\emph{{\(\upsilon\)}}, \emph{w}]/{\unicode{12296}}\emph{{\(\upsilon\)}}\({}^{\mbox{2}}\) - 1, \emph{w}\({}^{\mbox{2}}\) - 1, \emph{{\(\upsilon\)}w} - \emph{w{\(\upsilon\)}}{\unicode{12297}}}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {198--210}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110677}, doi = {10.1504/IJICOT.2020.110677}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/IslamVP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/PatelP20, author = {Shikha Patel and Om Prakash}, title = {Repeated-root bidimensional (\emph{{\(\mu\)}}, \emph{{\(\nu\)}})-constacyclic codes of length 4\emph{p}\({}^{\mbox{\emph{t}}}\).2\({}^{\mbox{\emph{r}}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {266--289}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110738}, doi = {10.1504/IJICOT.2020.110738}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/PatelP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SilvaCC20, author = {Eduardo Brandani da Silva and Emerson Vitor Castelani and Maycow Gon{\c{c}}alves Carneiro}, title = {New quasi-cyclic codes from finite upper half-planes}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {3/4}, pages = {239--265}, year = {2020}, url = {https://doi.org/10.1504/IJICOT.2020.110737}, doi = {10.1504/IJICOT.2020.110737}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/SilvaCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BelliniS18, author = {Emanuele Bellini and Massimiliano Sala}, title = {A deterministic algorithm for the distance and weight distribution of binary nonlinear codes}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {1}, pages = {18--35}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10013076}, doi = {10.1504/IJICOT.2018.10013076}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BelliniS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DastbastehMAAH18, author = {Reza Dastbasteh and Seyed Hamed Mousavi and Taher Abualrub and Nuh Aydin and Javad Haghighat}, title = {Skew cyclic codes over {\unicode{61328}}\({}_{\mbox{p}}\) + u{\unicode{61328}}\({}_{\mbox{p}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {1}, pages = {81--99}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10013089}, doi = {10.1504/IJICOT.2018.10013089}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DastbastehMAAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DiaoG18, author = {Lingyu Diao and Jian Gao}, title = {{\(\mathbb{Z}\)}\({}_{\mbox{p}}\){\(\mathbb{Z}\)}\({}_{\mbox{p}}\)[u]-additive cyclic codes}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {1}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10013075}, doi = {10.1504/IJICOT.2018.10013075}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DiaoG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Gao18, author = {Xin Gao}, title = {An iterative decoding scheme on random burst error correction with Reed-Solomon codes}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {2}, pages = {117--129}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10016412}, doi = {10.1504/IJICOT.2018.10016412}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Gao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/GoyalR18, author = {Mokshi Goyal and Madhu Raka}, title = {Duadic and triadic codes over a finite non-chain ring and their Gray images}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {1}, pages = {36--54}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10013079}, doi = {10.1504/IJICOT.2018.10013079}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/GoyalR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/HurleyH18, author = {Ted Hurley and Donny Hurley}, title = {Coding theory: the unit-derived methodology}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {1}, pages = {55--80}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10013082}, doi = {10.1504/IJICOT.2018.10013082}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/HurleyH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/HurleyHH18, author = {Ted Hurley and Donny Hurley and Barry Hurley}, title = {Quantum error-correcting codes: the unit design strategy}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {2}, pages = {169--182}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10016446}, doi = {10.1504/IJICOT.2018.10016446}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/HurleyHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/IslamP18, author = {Habibul Islam and Om Prakash}, title = {Skew cyclic and skew (\emph{{\(\alpha\)}}\({}_{\mbox{1}}\) + \emph{u{\(\alpha\)}}\({}_{\mbox{2}}\) + \emph{v{\(\alpha\)}}\({}_{\mbox{3}}\) + \emph{uv{\(\alpha\)}}\({}_{\mbox{4}}\))-constacyclic codes over \emph{F\({}_{\mbox{q}}\)} + \emph{uF\({}_{\mbox{q}}\)} + \emph{vF\({}_{\mbox{q}}\)} + \emph{uvF\({}_{\mbox{q}}\)}}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {2}, pages = {101--116}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10016413}, doi = {10.1504/IJICOT.2018.10016413}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/IslamP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/IslamP18a, author = {Habibul Islam and Om Prakash}, title = {A study of cyclic and constacyclic codes over Z\({}_{\mbox{4}}\) + \emph{u}Z\({}_{\mbox{4}}\) + \emph{v}Z\({}_{\mbox{4}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {2}, pages = {155--168}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10016445}, doi = {10.1504/IJICOT.2018.10016445}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/IslamP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/WangG18, author = {Yongkang Wang and Jian Gao}, title = {Constacyclic codes over the ring F\({}_{\mbox{\emph{p}}}\) + \emph{v}F\({}_{\mbox{\emph{p}}}\) and their applications of constructing new non-binary quantum codes}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {2}, pages = {130--141}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10016416}, doi = {10.1504/IJICOT.2018.10016416}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/WangG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/YildizK18, author = {Bahattin Yildiz and Abidin Kaya}, title = {Self-dual codes over Z\({}_{\mbox{4}}\)[\emph{x}]/(\emph{x}\({}^{\mbox{2}}\) + 2\emph{x}) and the Z\({}_{\mbox{4}}\)-images}, journal = {Int. J. Inf. Coding Theory}, volume = {5}, number = {2}, pages = {142--154}, year = {2018}, url = {https://doi.org/10.1504/IJICOT.2018.10016444}, doi = {10.1504/IJICOT.2018.10016444}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/YildizK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BathalaB17, author = {Srinivasulu Bathala and Maheshanand Bhaintwal}, title = {The structure of duals of cyclic codes over {\unicode{61328}}\({}_{\mbox{2}}\) + u{\unicode{61328}}\({}_{\mbox{2}}\) + v{\unicode{61328}}\({}_{\mbox{2}}\) + uv{\unicode{61328}}\({}_{\mbox{2}}\) and some {DNA} codes}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {1}, pages = {79--100}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10002267}, doi = {10.1504/IJICOT.2017.10002267}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BathalaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CayrelDG17, author = {Pierre{-}Louis Cayrel and Mbouye Khady Diagne and Cheikh Thi{\'{e}}coumba Gueye}, title = {NP-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {4}, pages = {276--288}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10005835}, doi = {10.1504/IJICOT.2017.10005835}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CayrelDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CharpinK17, author = {Pascale Charpin and Gohar M. Kyureghyan}, title = {On sets determining the differential spectrum of mappings}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {170--184}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004710}, doi = {10.1504/IJICOT.2017.10004710}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CharpinK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DoughertyKOSS17, author = {Steven T. Dougherty and Jon{-}Lark Kim and Buket {\"{O}}zkaya and Lin Sok and Patrick Sol{\'{e}}}, title = {The combinatorics of {LCD} codes: linear programming bound and orthogonal matrices}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {116--128}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004700}, doi = {10.1504/IJICOT.2017.10004700}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DoughertyKOSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Etzion17, author = {Tuvi Etzion}, title = {Regular graphs with forbidden subgraphs of K\({}_{\mbox{n}}\) with k edges}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {145--158}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004704}, doi = {10.1504/IJICOT.2017.10004704}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Etzion17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/FindST17, author = {Magnus Gausdal Find and Daniel Smith{-}Tone and Meltem S{\"{o}}nmez Turan}, title = {The number of boolean functions with multiplicative complexity 2}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {4}, pages = {222--236}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10005826}, doi = {10.1504/IJICOT.2017.10005826}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/FindST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/FloriC17, author = {Jean{-}Pierre Flori and G{\'{e}}rard D. Cohen}, title = {On a generalised combinatorial conjecture involving addition mod 2\({}^{\mbox{k}}\) - 1}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {107--115}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004697}, doi = {10.1504/IJICOT.2017.10004697}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/FloriC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/GomezCM17, author = {Arley Gomez and Carolina Mej{\'{\i}}a Corredor and J. Andres Montoya}, title = {Defining the almost-entropic regions by algebraic inequalities}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {1}, pages = {1--18}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10002264}, doi = {10.1504/IJICOT.2017.10002264}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/GomezCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/HudryL17, author = {Olivier Hudry and Antoine Lobstein}, title = {More results on the complexity of domination problems in graphs}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {129--144}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004701}, doi = {10.1504/IJICOT.2017.10004701}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/HudryL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Hurley17, author = {Ted Hurley}, title = {Solving underdetermined systems with error-correcting codes}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {4}, pages = {201--221}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10005825}, doi = {10.1504/IJICOT.2017.10005825}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Hurley17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/NiebuhrPCBB17, author = {Robert Niebuhr and Edoardo Persichetti and Pierre{-}Louis Cayrel and Stanislav Bulygin and Johannes Buchmann}, title = {On lower bounds for information set decoding over {\unicode{61328}}\({}_{\mbox{q}}\) and on the effect of partial knowledge}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {1}, pages = {47--78}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10002266}, doi = {10.1504/IJICOT.2017.10002266}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/NiebuhrPCBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/PanjehkehBA17, author = {Sajjad Mazloum Panjehkeh and Gholam Reza Mohtashami Borzadaran and Mohammad Amini}, title = {Results related to exponential entropy}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {4}, pages = {258--275}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10005832}, doi = {10.1504/IJICOT.2017.10005832}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/PanjehkehBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Randriambololona17, author = {Hugues Randriambololona}, title = {On metric convexity, the discrete Hahn-Banach theorem, separating systems and sets of points forming only acute angles}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {159--169}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004709}, doi = {10.1504/IJICOT.2017.10004709}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Randriambololona17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SchaathunK17, author = {Hans Georg Schaathun and Minoru Kuribayashi}, title = {Obfuscation in digital fingerprinting}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {2/3}, pages = {185--200}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10004711}, doi = {10.1504/IJICOT.2017.10004711}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SchaathunK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SharmaB17, author = {Amit Sharma and Maheshanand Bhaintwal}, title = {A class of skew-constacyclic codes over {\(\mathbb{Z}\)}\({}_{\mbox{4}}\) + u{\(\mathbb{Z}\)}\({}_{\mbox{4}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {4}, pages = {289--303}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10005836}, doi = {10.1504/IJICOT.2017.10005836}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SharmaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SharmaK17, author = {Anuradha Sharma and Taranjot Kaur}, title = {On cyclic {\unicode{61328}}\({}_{\mbox{q}}\)-linear {\unicode{61328}}\({}_{\mbox{q\({}^{\mbox{t}}\)}}\)-codes}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {1}, pages = {19--46}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10002265}, doi = {10.1504/IJICOT.2017.10002265}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SharmaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SharmaS17, author = {Anuradha Sharma and Amit K. Sharma}, title = {Byte weight enumerators of codes over {\unicode{61328}}\({}_{\mbox{p}}\) and modular forms over a totally real field}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {4}, pages = {237--257}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10005828}, doi = {10.1504/IJICOT.2017.10005828}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SharmaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SpreaficoF17, author = {Marcos Vinicius Spreafico and Marcelo Firer}, title = {Invariants of MacWilliams identity: weight and ideal distribution in poset spaces}, journal = {Int. J. Inf. Coding Theory}, volume = {4}, number = {1}, pages = {101--105}, year = {2017}, url = {https://doi.org/10.1504/IJICOT.2017.10002268}, doi = {10.1504/IJICOT.2017.10002268}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SpreaficoF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BlaumH16, author = {Mario Blaum and Steven R. Hetzler}, title = {Integrated interleaved codes as locally recoverable codes: properties and performance}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {4}, pages = {324--344}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.079494}, doi = {10.1504/IJICOT.2016.079494}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BlaumH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/JainC16, author = {K. C. Jain and Praphull Chhabra}, title = {New generalised divergence measure for increasing functions}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {3}, pages = {197--216}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.076964}, doi = {10.1504/IJICOT.2016.076964}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/JainC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/LiuO16, author = {Shiqiu Liu and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Partially collaborative storage codes in the presence of an eavesdropper}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {3}, pages = {177--196}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.076955}, doi = {10.1504/IJICOT.2016.076955}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/LiuO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/ParraCH16, author = {Jhordany Rodriguez Parra and Terence H. Chan and Siu{-}Wai Ho}, title = {Updatable encryption in distributed storage systems using key-homomorphic pseudorandom functions}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {4}, pages = {365--391}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.079500}, doi = {10.1504/IJICOT.2016.079500}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/ParraCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SasidharanPKVSK16, author = {Birenjith Sasidharan and N. Prakash and M. Nikhil Krishnan and Myna Vajha and Kaushik Senthoor and P. Vijay Kumar}, title = {Outer bounds on the storage-repair bandwidth trade-off of exact-repair regenerating codes}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {4}, pages = {255--298}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.079498}, doi = {10.1504/IJICOT.2016.079498}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SasidharanPKVSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Sharma16, author = {Anuradha Sharma}, title = {On cyclic codes of length p\({}^{\mbox{n}}\){\(\mathscr{l}\)}\({}^{\mbox{m}}\) over a finite field}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {3}, pages = {217--233}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.076965}, doi = {10.1504/IJICOT.2016.076965}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Sharma16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SharmaB16, author = {Amit Sharma and Maheshanand Bhaintwal}, title = {F\({}_{\mbox{3}}\)R-skew cyclic codes}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {3}, pages = {234--251}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.076967}, doi = {10.1504/IJICOT.2016.076967}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SharmaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/ShumC16, author = {Kenneth W. Shum and Junyu Chen}, title = {Cooperative repair of multiple node failures in distributed storage systems}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {4}, pages = {299--323}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.079495}, doi = {10.1504/IJICOT.2016.079495}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/ShumC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/TamoBGC16, author = {Itzhak Tamo and Alexander Barg and Sreechakra Goparaju and A. Robert Calderbank}, title = {Cyclic {LRC} codes, binary {LRC} codes, and upper bounds on the distance of cyclic codes}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {4}, pages = {345--364}, year = {2016}, url = {https://doi.org/10.1504/IJICOT.2016.079496}, doi = {10.1504/IJICOT.2016.079496}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/TamoBGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/AshrafM15, author = {Mohammad Ashraf and Ghulam Mohammad}, title = {Construction of quantum codes from cyclic codes over F\({}_{\mbox{p}}\) + vF\({}_{\mbox{p}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {2}, pages = {137--144}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.072627}, doi = {10.1504/IJICOT.2015.072627}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/AshrafM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CandauGH15, author = {Marion Candau and Roland Gautier and Johannes Huisman}, title = {Non-commutative convolutional codes over the infinite dihedral group}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {1}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.068694}, doi = {10.1504/IJICOT.2015.068694}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CandauGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CayrelGNN15, author = {Pierre{-}Louis Cayrel and Cheikh Thiecoumba Gueye and Ousmane Ndiaye and Robert Niebuhr}, title = {Critical attacks in code-based cryptography}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {2}, pages = {158--176}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.072639}, doi = {10.1504/IJICOT.2015.072639}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CayrelGNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Dumer15, author = {Ilya Dumer}, title = {Mixed polarized constructions}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {2}, pages = {97--106}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.072611}, doi = {10.1504/IJICOT.2015.072611}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Dumer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/HuntPS15, author = {Francis H. Hunt and Stephanie Perkins and Derek H. Smith}, title = {Channel models and error correction codes for {DNA} information storage}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {2}, pages = {120--136}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.072619}, doi = {10.1504/IJICOT.2015.072619}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicot/HuntPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/KocakKOS15, author = {Nese Ko{\c{c}}ak and Onur Ko{\c{c}}ak and Ferruh {\"{O}}zbudak and Z{\"{u}}lf{\"{u}}kar Saygi}, title = {Characterisation and enumeration of a class of semi-bent quadratic Boolean functions}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {1}, pages = {39--57}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.068696}, doi = {10.1504/IJICOT.2015.068696}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/KocakKOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/OggierD15, author = {Fr{\'{e}}d{\'{e}}rique E. Oggier and Anwitaman Datta}, title = {On repairing erasure coded data in an active-passive mixed storage network}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {1}, pages = {58--77}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.068697}, doi = {10.1504/IJICOT.2015.068697}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/OggierD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Oued15, author = {Mohammed El Oued}, title = {On {MDR} codes over a finite ring}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {2}, pages = {107--119}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.072612}, doi = {10.1504/IJICOT.2015.072612}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Oued15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/PumplunS15, author = {Susanne Pumpl{\"{u}}n and Andrew Steele}, title = {Fast-decodable {MIDO} codes from non-associative algebras}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {1}, pages = {15--38}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.068695}, doi = {10.1504/IJICOT.2015.068695}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/PumplunS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/YaoSS15, author = {Ting Yao and Minjia Shi and Patrick Sol{\'{e}}}, title = {Double cyclic codes over {\(\mathbb{F}\)}\({}_{\mbox{q}}\) + u{\(\mathbb{F}\)}\({}_{\mbox{q}}\) + u\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{q}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {3}, number = {2}, pages = {145--157}, year = {2015}, url = {https://doi.org/10.1504/IJICOT.2015.072637}, doi = {10.1504/IJICOT.2015.072637}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/YaoSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/AshrafM14, author = {Mohammad Ashraf and Ghulam Mohammad}, title = {On skew cyclic codes over F\({}_{\mbox{3}}\) + vF\({}_{\mbox{3}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {4}, pages = {218--225}, year = {2014}, url = {https://doi.org/10.1504/IJICOT.2014.066106}, doi = {10.1504/IJICOT.2014.066106}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/AshrafM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DasGDS14, author = {Subrata Das and Satrajit Ghosh and Parthasarathi Dasgupta and Samar Sen{-}Sarma}, title = {Algorithms for rotation symmetric Boolean functions}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {4}, pages = {238--265}, year = {2014}, url = {https://doi.org/10.1504/IJICOT.2014.066109}, doi = {10.1504/IJICOT.2014.066109}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DasGDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/KumarAB14, author = {Pankaj Kumar and S. K. Arora and Sudhir Batra}, title = {Primitive idempotents and generator polynomials of some minimal cyclic codes of length p\({}^{\mbox{n}}\)q\({}^{\mbox{m}}\)}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {4}, pages = {191--217}, year = {2014}, url = {https://doi.org/10.1504/IJICOT.2014.066087}, doi = {10.1504/IJICOT.2014.066087}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/KumarAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/OShaughnessy14, author = {Jessica O'Shaughnessy}, title = {Convolutional codes from group rings}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {4}, pages = {171--190}, year = {2014}, url = {https://doi.org/10.1504/IJICOT.2014.066083}, doi = {10.1504/IJICOT.2014.066083}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/OShaughnessy14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/YildizA14, author = {Bahattin Yildiz and Nuh Aydin}, title = {On cyclic codes over {\(\mathbb{Z}\)}\({}_{\mbox{4}}\) + u{\(\mathbb{Z}\)}\({}_{\mbox{4}}\) and their {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-images}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {4}, pages = {226--237}, year = {2014}, url = {https://doi.org/10.1504/IJICOT.2014.066107}, doi = {10.1504/IJICOT.2014.066107}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/YildizA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Al-HawaryAA13, author = {Sulieman Ibraheem Shelash Al{-}Hawary and Baha{\`{a}} Abdul{-}Hafez Attallah Al{-}Nady and Main Naser Alolayyan}, title = {Effect of brand name and price on business to business {(B2B)} success: an empirical study on sample of food hypermarket retailers in Amman city}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {2/3}, pages = {115--139}, year = {2013}, url = {https://doi.org/10.1504/IJICOT.2013.059728}, doi = {10.1504/IJICOT.2013.059728}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Al-HawaryAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DaritiS13, author = {Rabi{\^{\i}} Dariti and El Mamoun Souidi}, title = {New families of perfect linear error-block codes}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {2/3}, pages = {84--95}, year = {2013}, url = {https://doi.org/10.1504/IJICOT.2013.059702}, doi = {10.1504/IJICOT.2013.059702}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DaritiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Higgs13, author = {Russell Higgs}, title = {Revisiting the linear information flow algorithm}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {2/3}, pages = {96--104}, year = {2013}, url = {https://doi.org/10.1504/IJICOT.2013.059703}, doi = {10.1504/IJICOT.2013.059703}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Higgs13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Kuznetsov13, author = {Oleg Kuznetsov}, title = {On some invariances of left and right autocorrelation functions of sequences over the quaternions}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {2/3}, pages = {105--114}, year = {2013}, url = {https://doi.org/10.1504/IJICOT.2013.059704}, doi = {10.1504/IJICOT.2013.059704}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Kuznetsov13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/KuznetsovH13, author = {Oleg Kuznetsov and Thomas Eric Hall}, title = {A method of constructing a quaternion perfect sequence using composition of sequences of even lengths}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {2/3}, pages = {67--83}, year = {2013}, url = {https://doi.org/10.1504/IJICOT.2013.059701}, doi = {10.1504/IJICOT.2013.059701}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/KuznetsovH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/OuaretCB13, author = {Zoubir Ouaret and Rachid Chalal and Omar Boussaid}, title = {An overview of {XML} warehouse design approaches and techniques}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {2/3}, pages = {140--170}, year = {2013}, url = {https://doi.org/10.1504/IJICOT.2013.059729}, doi = {10.1504/IJICOT.2013.059729}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/OuaretCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BatraA11, author = {Sudhir Batra and S. K. Arora}, title = {Some cyclic codes of prime-power length}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {1}, pages = {1--9}, year = {2011}, url = {https://doi.org/10.1504/IJICOT.2011.044675}, doi = {10.1504/IJICOT.2011.044675}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BatraA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BouyuklievaYR11, author = {Stefka Bouyuklieva and Nikolay I. Yankov and Radka Russeva}, title = {On the classication of binary self-dual [44, 22, 8] codes with an automorphism of order 3 or 7}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {1}, pages = {21--37}, year = {2011}, url = {https://doi.org/10.1504/IJICOT.2011.044676}, doi = {10.1504/IJICOT.2011.044676}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BouyuklievaYR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Interlando11, author = {J. Carmelo Interlando}, title = {Algebraic decoding of the ternary (37, 18, 11) quadratic residue code}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {1}, pages = {59--65}, year = {2011}, url = {https://doi.org/10.1504/IJICOT.2011.044678}, doi = {10.1504/IJICOT.2011.044678}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Interlando11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/SiapAAS11, author = {Irfan Siap and Taher Abualrub and Nuh Aydin and Padmapani Seneviratne}, title = {Skew cyclic codes of arbitrary length}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {1}, pages = {10--20}, year = {2011}, url = {https://doi.org/10.1504/IJICOT.2011.044674}, doi = {10.1504/IJICOT.2011.044674}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/SiapAAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/ZhangZL11, author = {Hui Zhang and Jin Zhou and Jun Li}, title = {Minimising delay for video conference with network coding}, journal = {Int. J. Inf. Coding Theory}, volume = {2}, number = {1}, pages = {38--58}, year = {2011}, url = {https://doi.org/10.1504/IJICOT.2011.044677}, doi = {10.1504/IJICOT.2011.044677}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/ZhangZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/AldersonM10, author = {T. L. Alderson and Keith E. Mellinger}, title = {Classes of permutation arrays in finite projective spaces}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {371--383}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032863}, doi = {10.1504/IJICOT.2010.032863}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/AldersonM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BlondeauCC10, author = {C{\'{e}}line Blondeau and Anne Canteaut and Pascale Charpin}, title = {Differential properties of power functions}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {149--170}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032132}, doi = {10.1504/IJICOT.2010.032132}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BlondeauCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CarletDPS10, author = {Claude Carlet and Lars Eirik Danielsen and Matthew Geoffrey Parker and Patrick Sol{\'{e}}}, title = {Self-dual bent functions}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {384--399}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032864}, doi = {10.1504/IJICOT.2010.032864}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CarletDPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CarletM10, author = {Claude Carlet and Sihem Mesnager}, title = {On the construction of bent vectorial functions}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {133--148}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032131}, doi = {10.1504/IJICOT.2010.032131}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CarletM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/DoughertyKL10, author = {Steven T. Dougherty and Jon{-}Lark Kim and Hongwei Liu}, title = {Constructions of self-dual codes over finite commutative chain rings}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {171--190}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032133}, doi = {10.1504/IJICOT.2010.032133}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/DoughertyKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Duursma10, author = {Iwan M. Duursma}, title = {Binomial moments for divisible self-dual codes}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {191--199}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032134}, doi = {10.1504/IJICOT.2010.032134}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Duursma10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/GlassJK10, author = {Darren B. Glass and David Joyner and Amy Ksir}, title = {Codes from Riemann-Roch spaces for y\({}^{\mbox{2}}\) = x\({}^{\mbox{p}}\) - x over GF(p)}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {3}, pages = {298--312}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032545}, doi = {10.1504/IJICOT.2010.032545}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/GlassJK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/GulliverH10, author = {T. Aaron Gulliver and Masaaki Harada}, title = {{MDS} self-dual codes of lengths 16 and 18}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {208--213}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032136}, doi = {10.1504/IJICOT.2010.032136}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/GulliverH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Hou10, author = {Xiang{-}Dong Hou}, title = {Enumeration of AGL(m/3, double struck capital F\({}_{\mbox{p{\({^3}\)}}}\))-invariant extended cyclic codes}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {214--243}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032137}, doi = {10.1504/IJICOT.2010.032137}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Hou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Huffman10, author = {W. Cary Huffman}, title = {Cyclic double struck capital F\({}_{\mbox{q}}\)-linear double struck capital F\({}_{\mbox{q\({}^{\mbox{t}}\)}}\)-codes}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {3}, pages = {249--284}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032543}, doi = {10.1504/IJICOT.2010.032543}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Huffman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/HurleyMW10, author = {Ted Hurley and Paul McEvoy and Jakub Wenus}, title = {Algebraic constructions of {LDPC} codes with no short cycles}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {3}, pages = {285--297}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032544}, doi = {10.1504/IJICOT.2010.032544}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/HurleyMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Kelley10, author = {Christine A. Kelley}, title = {Minimum distance and pseudodistance lower bounds for generalised {LDPC} codes}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {3}, pages = {313--333}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032546}, doi = {10.1504/IJICOT.2010.032546}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Kelley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/KeyMR10, author = {Jennifer D. Key and Jamshid Moori and Bernardo Gabriel Rodrigues}, title = {Codes associated with triangular graphs and permutation decoding}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {3}, pages = {334--349}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032547}, doi = {10.1504/IJICOT.2010.032547}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/KeyMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Liu10, author = {Xiaoyu Liu}, title = {Binary divisible codes of maximum dimension}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {355--370}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032862}, doi = {10.1504/IJICOT.2010.032862}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Liu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/MelchorCG10, author = {Carlos Aguilar Melchor and Christophe Chabot and Philippe Gaborit}, title = {There is no Euclidean self-dual quaternary [18, 9, 7] code}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {200--207}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032135}, doi = {10.1504/IJICOT.2010.032135}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/MelchorCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Varbanov10, author = {Zlatko Varbanov}, title = {New results on s-extremal additive codes over {GF(4)}}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {400--409}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032865}, doi = {10.1504/IJICOT.2010.032865}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Varbanov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Ward10, author = {Harold N. Ward}, title = {A selection of divisible lexicographic codes}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {410--428}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032866}, doi = {10.1504/IJICOT.2010.032866}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Ward10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Wood10, author = {Jay A. Wood}, title = {Anti-isomorphisms, character modules and self-dual codes over non-commutative rings}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {429--444}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032867}, doi = {10.1504/IJICOT.2010.032867}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Wood10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CharlesJL09, author = {Denis Xavier Charles and Kamal Jain and Kristin E. Lauter}, title = {Signatures for network coding}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {3--14}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024044}, doi = {10.1504/IJICOT.2009.024044}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CharlesJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Horiguchi09, author = {Naoyuki Horiguchi}, title = {On the classification of the codes obtained by subtracting from some ternary extremal self-dual codes}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {109--118}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024049}, doi = {10.1504/IJICOT.2009.024049}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Horiguchi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/HurleyH09, author = {Paul Hurley and Ted Hurley}, title = {Codes from zero-divisors and units in group rings}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {57--87}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024047}, doi = {10.1504/IJICOT.2009.024047}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/HurleyH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/KaltchenkoT09, author = {Alexei Kaltchenko and Nina Timofeeva}, title = {Bias reduction via linear combination of nearest neighbour entropy estimators}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {39--56}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024046}, doi = {10.1504/IJICOT.2009.024046}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/KaltchenkoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/MaN09, author = {Siu Lun Ma and Wei Shean Ng}, title = {On non-existence of perfect and nearly perfect sequences}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {15--38}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024045}, doi = {10.1504/IJICOT.2009.024045}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/MaN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/Mitra09, author = {Abhijit Mitra}, title = {A new class of pseudo-random sequences from Mersenne numbers}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {119--127}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024050}, doi = {10.1504/IJICOT.2009.024050}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/Mitra09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/ZakiS09, author = {Mohammed Zaki and M. Sayed}, title = {The use of genetic programming for adaptive text compression}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {1}, pages = {88--108}, year = {2009}, url = {https://doi.org/10.1504/IJICOT.2009.024048}, doi = {10.1504/IJICOT.2009.024048}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/ZakiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.