2006
DOI: 10.1017/cbo9780511808968
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Coding Theory

Abstract: Error-correcting codes constitute one of the key ingredients in achieving the high degree of reliability required in modern data transmission and storage systems. This 2006 book introduces the reader to the theoretical foundations of error-correcting codes, with an emphasis on Reed-Solomon codes and their derivative codes. After reviewing linear codes and finite fields, the author describes Reed-Solomon codes and various decoding algorithms. Cyclic codes are presented, as are MDS codes, graph codes, and codes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
433
0
4

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 554 publications
(440 citation statements)
references
References 0 publications
3
433
0
4
Order By: Relevance
“…FEC uses the Reed-Solomon code because it is strong against burst error. The Reed-Solomon code is one of block code [21]. In the Reed-Solomon code, information is divided into consecutive bits of M information (referred to as a symbol), and the information is encoded and decoded using these symbols.…”
Section: Fec In Tcp-afecmentioning
confidence: 99%
“…FEC uses the Reed-Solomon code because it is strong against burst error. The Reed-Solomon code is one of block code [21]. In the Reed-Solomon code, information is divided into consecutive bits of M information (referred to as a symbol), and the information is encoded and decoded using these symbols.…”
Section: Fec In Tcp-afecmentioning
confidence: 99%
“…In the bipartite case also −n is an eigenvalue of A, and the corresponding eigenvector has 1s in the first half of the positions and -1 in the rest. It is known [8] that for a connected graph −n ≤ λ i ≤ n where λ i is any eigenvalue and that the second largest eigenvalue λ is closely related to the expansion properties of the graph. Large random graphs and known families with good expansion properties have λ = 2 √ n − 1 [7].…”
Section: Bounds On the Minimum Distancementioning
confidence: 99%
“…We follow the standard line of proof by defining a vector v as a modified indicator vector for the sets S and T , and then apply a well-known result (see e.g. [8], Lemma 13.6)…”
Section: Improved Lower Bounds On the Minimum Distancementioning
confidence: 99%
See 1 more Smart Citation
“…Now, since the minimum distance ofC is 2t+1, all vectors in B M of Hamming weight t or less must have distinct syndromes. Furthermore, there are families of codes, such as BCH codes (and Hamming codes as a special case), for which the inverse mapping from syndromes to vectors of Hamming weight ≤ t can be computed efficiently [16,, [18,Chapter 7].…”
Section: Pushing the Modulo-2 Counters Outmentioning
confidence: 99%