{"id":"https://openalex.org/W2964288918","doi":"https://doi.org/10.1109/isit.2014.6875140","title":"Re-encoding reformulation and application to Welch-Berlekamp algorithm","display_name":"Re-encoding reformulation and application to Welch-Berlekamp algorithm","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2964288918","doi":"https://doi.org/10.1109/isit.2014.6875140","mag":"2964288918"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6875140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082644080","display_name":"Morgan Barbier","orcid":null},"institutions":[{"id":"https://openalex.org/I194210350","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs de Caen","ror":"https://ror.org/01fpqqe90","country_code":"FR","type":"education","lineage":["https://openalex.org/I194210350","https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Morgan Barbier","raw_affiliation_strings":["ENSICAEN \u2013 GREYC"],"affiliations":[{"raw_affiliation_string":"ENSICAEN \u2013 GREYC","institution_ids":["https://openalex.org/I4210139483","https://openalex.org/I194210350"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5082644080"],"corresponding_institution_ids":["https://openalex.org/I194210350","https://openalex.org/I4210139483"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28430063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1782","last_page":"1786"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpolation","display_name":"Interpolation (computer graphics)","score":0.7805569767951965},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.741658091545105},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.7340545654296875},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6881635189056396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6427029371261597},{"id":"https://openalex.org/keywords/bivariate-analysis","display_name":"Bivariate analysis","score":0.45731019973754883},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12012219429016113},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07230475544929504},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.05570310354232788}],"concepts":[{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.7805569767951965},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.741658091545105},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.7340545654296875},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6881635189056396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6427029371261597},{"id":"https://openalex.org/C64341305","wikidata":"https://www.wikidata.org/wiki/Q4919225","display_name":"Bivariate analysis","level":2,"score":0.45731019973754883},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12012219429016113},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07230475544929504},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.05570310354232788},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6875140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1580365030","https://openalex.org/W1594757504","https://openalex.org/W1871606885","https://openalex.org/W1976677460","https://openalex.org/W1983029360","https://openalex.org/W1990695921","https://openalex.org/W2032431003","https://openalex.org/W2089272132","https://openalex.org/W2105294563","https://openalex.org/W2113830710","https://openalex.org/W2120227138","https://openalex.org/W2126796274","https://openalex.org/W2168558479","https://openalex.org/W3121145081","https://openalex.org/W4205630623","https://openalex.org/W4298865552","https://openalex.org/W6648083697"],"related_works":["https://openalex.org/W1721599012","https://openalex.org/W2368824897","https://openalex.org/W1508050556","https://openalex.org/W1910862367","https://openalex.org/W2379365082","https://openalex.org/W2370747590","https://openalex.org/W2030109976","https://openalex.org/W2369260257","https://openalex.org/W2389120450","https://openalex.org/W55249799"],"abstract_inverted_index":{"The":[0,82],"main":[1],"decoding":[2],"algorithms":[3],"for":[4,66,78,84],"Reed-Solomon":[5],"codes":[6],"are":[7],"based":[8],"on":[9],"a":[10,48,73],"bivariate":[11],"interpolation":[12,22,69,80],"step,":[13],"which":[14,52],"is":[15,63],"expensive":[16],"in":[17,26,46],"time":[18],"complexity.":[19],"Lot":[20],"of":[21,32,75],"methods":[23],"were":[24],"proposed":[25,45],"order":[27],"to":[28,54,89,92],"decrease":[29],"the":[30,56,67,76,93],"complexity":[31],"this":[33,61,85],"procedure,":[34],"but":[35],"they":[36],"stay":[37],"still":[38],"expensive.":[39],"Then":[40],"Koetter,":[41],"Ma":[42],"and":[43],"Vardy":[44],"2010":[47],"technique,":[49],"called":[50],"re-encoding,":[51],"allows":[53],"reduce":[55],"practical":[57],"running":[58],"time.":[59],"However,":[60],"trick":[62],"only":[64,88],"devoted":[65],"Koetter":[68],"algorithm.":[70,95],"We":[71],"propose":[72],"reformulation":[74,86],"re-encoding":[77],"any":[79],"methods.":[81],"assumption":[83],"permits":[87],"apply":[90],"it":[91],"Welch-Berlekamp":[94]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
