Information theory is an exceptional field in many ways. Technically, it is one of the rare fields in which mathematical results and insights have led directly to significant engineering payoffs. Professionally, it is a field that has sustained a remarkable degree of community, collegiality and high standards. James L. Massey, whose work in the field is honored here, embodies the highest standards of the profession in his own career. The book covers the latest work on: block coding, convolutional coding, cryptography, and information theory. The 44 contributions represent a cross-section of the world's leading scholars, scientists and researchers in information theory and communication. The book is rounded off with an index and a bibliography of publications by James Massey.For example, it is easily established from the arguments of this paper that constrained subcodes of linear codes can ... E.g., it is clear that Theorem 1, as well as Corollary 1. applies to M-PSK (A/-ary phase-shift keying) when M is a prime and linear codes over FM are used. ... of this type, e.g., alternant codes, ( classical) Goppa codes, quasi-cyclic codes, self-dual codes , and shortened cyclic codes (cf.
|Title||:||Communications and Cryptography|
|Author||:||James L. Massey, Richard E. Blahut|
|Publisher||:||Springer Science & Business Media - 1994-06-30|