Further Progress on the GM-MDS Conjecture for Reed-Solomon Codes
暂无分享,去创建一个
[1] Alexander Sprintson,et al. Weakly secure data exchange with Generalized Reed Solomon codes , 2014, 2014 IEEE International Symposium on Information Theory.
[2] Chau Yuen,et al. On Simple Multiple Access Networks , 2015, IEEE Journal on Selected Areas in Communications.
[3] Tracey Ho,et al. Distributed reed-solomon codes for simple multiple access networks , 2014, 2014 IEEE International Symposium on Information Theory.
[4] Babak Hassibi,et al. Optimum Linear Codes with Support Constraints over Small Fields , 2018, 2018 IEEE Information Theory Workshop (ITW).
[5] Wayne D. Blizard,et al. Multiset Theory , 1989, Notre Dame J. Formal Log..
[6] Alexander Sprintson,et al. An algebraic-combinatorial proof technique for the GM-MDS conjecture , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[7] Chau Yuen,et al. On the existence of MDS codes over small fields with constrained generator matrices , 2014, 2014 IEEE International Symposium on Information Theory.
[8] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[9] Alexander Sprintson,et al. Algorithms for weakly secure data exchange , 2013, 2013 International Symposium on Network Coding (NetCod).
[10] Babak Hassibi,et al. Balanced Reed-Solomon codes for all parameters , 2016, 2016 IEEE Information Theory Workshop (ITW).
[11] Itzhak Tamo,et al. Bounds on the Parameters of Locally Recoverable Codes , 2015, IEEE Transactions on Information Theory.
[12] Babak Hassibi,et al. Balanced Reed-Solomon codes , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[13] Sergey Yekhanin,et al. Locally Decodable Codes , 2012, Found. Trends Theor. Comput. Sci..
[14] Shachar Lovett. A proof of the GM-MDS conjecture , 2018, Electron. Colloquium Comput. Complex..
[15] Tracey Ho,et al. Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.