Mostrar el registro sencillo del ítem
dc.contributor.author | Geil, Olav | |
dc.contributor.author | Matsumoto, Ryutaroh | |
dc.contributor.author | Ruano Benito, Diego | |
dc.date.accessioned | 2018-09-25T11:07:23Z | |
dc.date.available | 2018-09-25T11:07:23Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Finite Fields and their Applications. Volume 23, pages 35-52 (2013) | es |
dc.identifier.uri | http://uvadoc.uva.es/handle/10324/31743 | |
dc.description | Producción Científica | es |
dc.description.abstract | We show that the Feng-Rao bound for dual codes and a similar bound by Andersen and Geil for primary codes are consequences of each other. This implies that the Feng-Rao decoding algorithm can be applied to decode primary codes up to half their designed minimum distance. The technique applies to any linear code for which information on well-behaving pairs is available. Consequently we are able to decode efficiently a large class of codes for which no non-trivial decoding algorithm was previously known. Among those are important families of multivariate polynomial codes. Matsumoto and Miura derived from the Feng-Rao bound a bound for primary one-point algebraic geometric codes and showed how to decode up to what is guaranteed by their bound. The exposition in Matsumoto-Miura requires the use of differentials which was not needed in Andersen-Geil. Nevertheless we demonstrate a very strong connection between Matsumoto and Miura's bound and Andersen and Geil's bound when applied to primary one-point algebraic geometric codes. | es |
dc.format.mimetype | application/pdf | es |
dc.language.iso | eng | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.title | Feng-Rao decoding of primary codes | es |
dc.type | info:eu-repo/semantics/article | es |
dc.identifier.doi | 10.1016/j.ffa.2013.03.005 | es |
dc.peerreviewed | SI | es |
dc.description.project | The present work was done while Ryutaroh Matsumoto was visiting Aalborg University as a Velux Visiting Professor supported by the Villum Foundation. The authors gratefully acknowledge this support. The authors also gratefully acknowledge the support from the Danish National Research Foundation and the National Science Foundation of China (Grant No. 11061130539) for the Danish-Chinese Center for Applications of Algebraic Geometry in Coding Theory and Cryptography. Furthermore the authors are thankful for the support from Spanish grant MTM2007-64704, the Spanish MINECO grant No. MTM2012-36917-C03-03, and for the MEXT Grant-in-Aid for Scientific Research (A) No. 23246071. | es |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
La licencia del ítem se describe como Attribution-NonCommercial-NoDerivatives 4.0 International