Here is a list of all codes that belong to the classical domain.
- 120-cell code[1] Spherical \((4,600,(7-3\sqrt{5})/4)\) code whose codewords are the vertices of the 120-cell. See [3][2; Table 1][4; Table 3] for realizations of the 600 codewords.
- 24-cell code[1] Spherical \((4,24,1)\) code whose codewords are the vertices of the 24-cell. Codewords form the minimal lattice-shell code of the \(D_4\) lattice.
- 600-cell code[1] Spherical \((4,120,(3-\sqrt{5})/2)\) code whose codewords are the vertices of the 600-cell. See [5; Table 1][4; Table 3] for realizations of the 120 codewords. A realization in terms of quaternion coordinates yields the 120 elements of the binary icosahedral group \(2I\) [6].
- Accumulate-repeat-accumulate (ARA) code[7] A generalization of the RA code in which the outer repetition-code encoding step is augmented with an acumulator acting on a fraction of the incoming bits. In addition, the code may be punctured after the final acumulating step.
- Additive \(q\)-ary code A \(q\)-ary code whose codewords are closed under addition, i.e., for any codewords \(x,y\), \(x+y\) is also a codeword.
- Alamouti code[8] The simplest OSTBC, with \(n=2\) transmitting antennas, \(m=1\) receiving antennas, and \(t=2\) uses.
- Algebraic LDPC code LDPC code whose parity check matrix is constructed explicitly (i.e., non-randomly) from a particular graph [9,10] or an algebraic structure such as a combinatorial design [11–13], balanced incomplete block design [14], a partial geometry [15], or a generalized polygon [16,17]. The extra structure and/or symmetry [18] of these codes can often be used to gain a better understanding of their properties.
- Algebraic-geometry (AG) code[19–21] Binary or \(q\)-ary code or subcode constructed from an algebraic curve of some genus over a finite field via the evaluation construction, the residue construction, or more general constructions that yield nonlinear codes. Linear AG codes from the first two constructions are also called geometric Goppa codes.
- Alternant code[22–25] Given a length-\(n\) GRS code \(C\) over \(GF(q^m)\), an alternant code is the \(GF(q)\)-subfield subcode of the dual of \(C\); see [26; Ch. 12]. Its parity-check matrix is an alternant matrix.
- Analog code a.k.a. Code over \(\mathbb{R}\).Encodes states (codewords) into coordinates in the \(n\)-dimensional (real or complex) coordinate space (\(\mathbb{R}^n\) or \(\mathbb{C}^n\)). Such codes include sphere packings, tilings, and any other codes that use real or complex numbers for encoding. The number of codewords may be infinite because the coordinate space is infinite, so various restricted versions have to be constructed in practice.
- Annealing-based spherical code[27–29] Code whose codewords are obtained from a simulated annealing or energy-repulsion numerical optimization procedure.
- Anticode[30,31]
- Antipode lattice[34] Lattice constructed via the antipode construction.
- Array code a.k.a. RAID code, Disk array code.Matrix code over \(GF(q)\) designed for use in distributed storage, with the first such application being a RAID-type array of hard-drives such that information is protected against erasure of one or more hard drives. Each column of a matrix codeword is typically treated as a single codeword coordinate via subpacketization (defined below) and represents a large data block. Array codes are denoted by \((n,k,m)\), where \(n\) is the number of nodes, \(k\) is the number of nodes needed to recover the data, and \(m\) is the column dimension of each codeword a.k.a. the subpacketization level.
- Array-based LDPC (AB-LDPC) code[35,36] QC-LDPC code constructed deterministically from a disk array code known as a B-code. Its parity-check matrix admits a compact representation [37] and is related to RS codes.
- Availability code[38,39] A \(t\)-availability parallel-recovery code is a code such any \(t\) coordinates can be recovered in multiple ways. That way, the code accomodates nodes that may be inaccessible during the recovery procedure.
- B-code[40] The first array code, constructed over \(GF(q)\). See [41] for more details.
- Balanced code[42] An even-length-\(n\) \(q\)-ary code whose nonzero codewords all have a Hamming weight of \(n/2\). A code is \(\epsilon\)-balanced if the relative weight (i.e., weight divided by \(n\)) of all nonzero codewords lies in the interval \([\frac{1-\epsilon}{2},\frac{1+\epsilon}{2}]\). A code is \(\gamma\)-unbiased if the relative weight lies in the interval \((\frac{1}{2}-\frac{1}{n^{\gamma}},\frac{1}{2}+\frac{1}{n^{\gamma}})\).
- Barnes-Wall (BW) lattice[43,44] Member of a family of \(2^{m+1}\)-dimensional lattices, denoted as BW\(_{2^{m+1}}\), that are the densest lattices known. Members include the integer square lattice \(\mathbb{Z}^2\), \(D_4\), the Gosset \(E_8\) lattice, and the \(\Lambda_{16}\) lattice, corresponding to \(m\in\{0,1,2,3\}\), respectively.
- Batch code[45] Binary code designed for minimizing the total amount of storage and the worst-case maximal load on any devices in a distributed system.
- Ben-Sasson-Goldreich-Harsha-Sudan-Vadhan (BGHSV) code[46] Locally testable \([n,k,d]\) code with \(n = k^{1+\epsilon}\) and query complexity of order \(O(1/\epsilon)\) for any \(\epsilon > 0\).
- Ben-Sasson-Sudan code[47] Locally testable \([n,k/2,d]_{2^m}\) code with \(k\) a power of two, \(n = k \log^{c} k\), and query complexity \(\log^{c}k\) for some universal constant \(c\).
- Ben-Sasson-Sudan-Vadhan-Wigderson (BSVW) code[48] Locally testable \([n,k,d]\) code with \(n = k \cdot 2^{\tilde{O}(\sqrt{\log k})}\) and asymptotically constant query complexity, where \(\tilde{O}(f)=O(f\cdot (\log f)^c)\) for some fixed constant \(c\).
- Berlekamp code[49; Ch. 9] A linear \(p\)-ary code that has Lee distance 5 and whose construction resembles that of RS codes. It is obtained by first constructing an RS-like parity-check matrix out of a certain field extension of \(GF(p)\) and then taking the subfield subcode of the corresponding code; see [50; Ch. 10.6].
- Best \((10,40,4)\) code[51,52] Binary nonlinear \((10,40,4)\) code that is unique [53]. Under Construction A, this code yields \(P_{10c}\), a non-lattice sphere packing that is the densest known in 10 dimensions [54][55; pg. 140].
- Binary BCH code[56–58] Cyclic binary code of odd length \(n\) whose zeroes are consecutive powers of a primitive \(n\)th root of unity \(\alpha\) (see Cyclic-to-polynomial correspondence). More precisely, the generator polynomial of a BCH code of designed distance \(\delta\geq 1\) is the lowest-degree monic polynomial with zeroes \(\{\alpha^b,\alpha^{b+1},\cdots,\alpha^{b+\delta-2}\}\) for some \(b\geq 0\). BCH codes are called narrow-sense when \(b=1\), and are called primitive when \(n=2^r-1\) for some \(r\geq 2\).
- Binary PSK (BPSK) code[59] a.k.a. Binary antipodal modulation, Phase-reversal keying (PRK), Antipodal signaling.Encodes one bit of information into a constellation of antipodal points \(\pm\alpha\) for complex \(\alpha\). These points are typically associated with two phases of an electromagnetic signal.
- Binary antipodal code a.k.a. Binary signal constellation.
- Binary balanced spherical code An \((n-1,K,\frac{nd}{nw-w^2})\) spherical code obtained from a constant-weight-\(w\) binary \((n,K,d)\) code via a component-wise binary balanced mapping (also known as the CW\(_2\) construction), \begin{align} \begin{split} 0&\to\sqrt{\frac{w}{n\left(n-w\right)}}\\1&\to -\sqrt{\frac{n-w}{nw}}~. \end{split} \tag*{(1)}\end{align} This construction can be extended to the general balanced binary construction CW\(_q\) for spherical code alphabets of size \(q\) [60; Sec. 6.6].
- Binary code Encodes \(K\) states (codewords) in \(n\) binary coordinates and has distance \(d\). Usually denoted as \((n,K,d)\). The distance is the minimum Hamming distance between a pair of distinct codewords.
- Binary duadic code[61] Member of a pair of cyclic linear binary codes that satisfy certain relations, depending on whether the pair is even-like or odd-like duadic. Duadic codes exist for lengths \(n\) that are products of powers of primes, with each prime being \(\pm 1\) modulo \(8\) [62].
- Binary group-orbit code[63,64] Bianry legnth-\(n\) whose codewords correspond to points in an orbit of some initial vector under a generating group \(G\), which is a subgroup of the group of bit-string permutations and translations, i.e., the automorphism group of binary codes under the Hamming distance.
- Binary linear LTC A binary linear code \(C\) of length \(n\) that is a \((u,R)\)-LTC with query complexity \(u\) and soundness \(R>0\).
- Binary quadratic-residue (QR) code Member of a quadruple of cyclic binary codes of prime length \(n=8m\pm 1\) for \(m\geq 1\) constructed using quadratic residues and nonresidues of \(n\).
- Binary-ternary mixed code[65] Encodes \(K\) states (codewords) in a string of \(n_1+n_2\) coordinates, with the first \(n_1\) coordinates being binary, and the last \(n_2\) coordinates being ternary.
- Biorthogonal spherical code a.k.a. Cross polytope code, Hyperoctahedron code, Orthoplex code, Co-cube code.Spherical \((n,2n,2)\) code whose codewords are all permutations of the \(n\)-dimensional vectors \((0,0,\cdots,0,\pm1)\), up to normalization. The code makes up the vertices of an \(n\)-orthoplex (a.k.a. hyperoctahedron or cross polytope).
- Block LDPC (B-LDPC) code[66] Member of a particular class of irregular QC-LDPC codes with efficient encoders.
- Block code A code intended to encode a piece, or block, of a data stream on a block of \(n\) symbols, with each symbol taking values from a fixed alphabet \(\Sigma\).
- Body-centered cubic (bcc) lattice Three-dimensional lattice consisting of all points \((x,y,z)\) whose integer components are either all even or all odd.
- Bose–Chaudhuri–Hocquenghem (BCH) code[67] Cyclic \(q\)-ary code, with \(n\) and \(q\) relatively prime, whose zeroes are consecutive powers of a primitive \(n\)th root of unity \(\alpha\). More precisely, the generator polynomial of a BCH code of designed distance \(\delta\geq 1\) is the lowest-degree monic polynomial with zeroes \(\{\alpha^b,\alpha^{b+1},\cdots,\alpha^{b+\delta-2}\}\) for some \(b\geq 0\). BCH codes are called narrow-sense when \(b=1\), and are called primitive when \(n=q^r-1\) for some \(r\geq 2\). More general BCH codes can be defined for zeroes are powers of the form \(\{b,b+s,b+2s,\cdots,b+(\delta-2)s\}\) where gcd\((s,n)=1\).
- Bounded-energy code a.k.a. Spherical cluster.Code whose codewords are points lie on or inside a real or complex sphere whose radius squared is called the energy.
- Cameron-Goethals-Seidel (CGS) isotropic subspace code[68] Member of a \((q(q^2-q+1),(q+1)(q^3+1),2-2/q^2)\) family of spherical codes for any prime-power \(q\). Constructed from generalized quadrangles, which in this case correspond to sets of totally isotropic points and lines in the projective space \(PG_{5}(q)\) [60; Exam. 9.4.5]. There exist multiple distinct spherical codes using this construction for \(q>3\) [69].
- Cartier code[70] A generalization of the Goppa codes to codes defined from curves of non-zero genus. Each code is a subcode of a certain residue AG code and is constructed using the Cartier operator.
- Chien-Choy generalized BCH (GBCH) code[71] An \([n,k\geq n-rm, d\geq r+1]_q\) alternant code defined using two polynomials \(P(x),G(x)\) that are relatively prime to \(x^n-1\), with \(\deg P \leq n-1\) and \(r = \deg G \leq n-1\).
- Classical fractal liquid code[72,73] Member of a family of \([L^D,O(L^{D-1}),O(L^{D-\epsilon})]_p\) linear codes on \(D\)-dimensional square lattices of side length \(L\) and for some prime \(p\) and \(\epsilon > 0\) that is based on \(p\)-ary generalizations of the Sierpinski triangle.
- Classical topological code[74–76] Classical code defined on a two-dimensional lattice and derived from a geometrically local stabilizer code, such as the surface code or color code.
- Code in permutations[77,78] a.k.a. Permutation-based code.Encodes codewords into permutations of \(n\) objects.
- Code with locality A code with \((r,\delta)\) locality is a code that encodes each codeword coordinate into an \([r+\delta-1,r,\delta]\) MDS code [79; Sec. 31.3.4.5]. In other words, given a codeword \(c\) and coordinate \(c_i\), there exists a coordinate set \(S_i\) of size \(\leq r+\delta-1\) such that the restriction \(C_{|S_i}\) of the code to that set is a code with minimum distance \(\delta\).
- Combinatorial design a.k.a. Block design, Covering design.A constant-weight binary code that is mapped into a combinatorial \(t\)-design.
- Complete-intersection RM-type code[80] Evaluation code of polynomials evaluated on points lying on a complete intersection.
- Completely regular code[81] A code \(C\) is completely regular if the weight distribution of any coset \(e+C\) depends only on the distance \(d(e,C)\) of \(e\) to \(C\) [82].
- Complex Hadamard spherical code[83] A spherical code obtained from particular complex Hadamard matrices [84].
- Concatenated code[85] a.k.a. Serially concatenated code.A code whose encoding mapping is a composition of two mappings: first the message set is mapped onto the code space of the outer code, then each coordinate of the outer code is mapped on the code space of the inner code. In the basic construction, the outer code's alphabet is the finite field \(GF(p^m)\) and the \(m\)-dimensional inner code is over over the field \(GF(p)\). The construction is not limited to linear codes.
- Conference code[86][26; pg. 55] A member of the family of \((n,2n+2,(n-1)/2)\) nonlinear binary codes for \(n=1\) modulo 4 that are constructed from conference matrices.
- Constacyclic code a.k.a. Twisted code.A classical code \(C\) of length \(n\) over an alphabet \(R\) is \(\alpha\)-constacyclic (or \(\alpha\)-twisted) if, for each string \(c_1 c_2 \cdots c_n\in C\), the string \(\alpha c_n, c_1, \cdots, c_{n-1} \in C\). A \(-1\)-constacyclic code is called negacyclic.
- Constant-energy code Code whose codewords are points on a real or complex sphere whose radius squared is called the energy. Typically, only angular distances between points are relevant for code performance, so one can normalize codewords of a constant-energy code to obtain up a spherical code, i.e., a constant energy code with energy one.
- Constant-weight code A block code over a field or a ring whose codewords all have the same Hamming weight \(w\). The complement of a binary constant-weight code is a constant-weight code obtained by interchanging zeroes and ones in the codewords. The set of all binary codewords of length \(n\) forms the Johnson space \(J(n,w)\) [87–90].
- Constantin-Rao (CR) code[91] A nonlinear single-asymmetric-error code that generalize VT codes and that is constructed from an Abelian group.
- Construction-\(A\) code[92] a.k.a. Mod-two lattice.
- Convolutional code[93] Infinite-block code that is formed using generator polynomials over the finite field with two elements. The encoder slides across contiguous subsets of the input bit-string (like a convolutional neural network) evaluating the polynomials on that window to obtain a number of parity bits. These parity bits are the encoded information.
- Covering code A \(q\)-ary code \(C\) is \(\rho\)-covering if \(\forall v \in GF(q)^{n}\), there is a codeword \(c \in C\) such that the Hamming distance \(D(c,v)\leq \rho\). More generally, a covering code in a metric space is covering if the union of balls of some radius centered at the codewords covers the entire space.
- Coxeter-Todd \(K_{12}\) lattice[94] Even integral lattice in dimension \(12\) that exhibits optimal packing. It's automorphism group was discovered by Mitchell [95]. For more details, see [96][55; Sec. 4.9].
- Cross-interleaved RS (CIRS) code[97,98] An IRS code that is constructed using two shortened RS codes and two forms of interleaving. The code can also be visualized as a 2D array code [41].
- Cubeoctahedron code Spherical \((3,12,1)\) code whose codewords are the vertices of the cubeoctahedron. Codewords form the minimal lattice-shell code of the \(D_3\) face-centered cubic (fcc) lattice.
- Cycle LDPC code[99] An LDPC code whose parity-check matrix forms the incidence matrix of a graph, i.e., has weight-two columns.
- Cycle code[74,99–103] a.k.a. Graph theoretic code, Graph homology code, Graph code.A code whose parity-check matrix forms the incidence matrix of a graph. This code's properties are derived from the size two chain complex associated with the graph.
- Cyclic code[104–108] A code of length \(n\) over an alphabet is cyclic if, for each codeword \(c_1 c_2 \cdots c_n\), the cyclically shifted string \(c_n c_1 \cdots c_{n-1}\) is also a codeword.
- Cyclic linear \(q\)-ary code A \(q\)-ary code of length \(n\) is cyclic if, for each codeword \(c_1 c_2 \cdots c_n\), the cyclically shifted string \(c_n c_1 \cdots c_{n-1}\) is also a codeword. A cyclic code is called primitive when \(n=q^r-1\) for some \(r\geq 2\). A shortened cyclic code is obtained from a cyclic code by taking only codewords with the first \(j\) zero entries, and deleting those zeroes.
- Cyclic linear binary code A binary code of length \(n\) is cyclic if, for each codeword \(c_1 c_2 \cdots c_n\), the cyclically shifted string \(c_n c_1 \cdots c_{n-1}\) is also a codeword. A cyclic code is called primitive when \(n=2^r-1\) for some \(r\geq 2\). A shortened cyclic code is obtained from a cyclic code by taking only codewords with the first \(j\) zero entries, and deleting those zeroes.
- Cyclic redundancy check (CRC) code[108–110] a.k.a. Frame check sequence (FCS).A generalization of the single parity-check code in which the generalization of the parity bit is the remainder of the data string (mapped into a polynomial via the Cyclic-to-polynomial correspondence) divided by some generator polynomial. A notable family of codes is referred to as CRC-(\(m-1\)), where \(m\) is the length of the generator polynomial.
- DNA storage code[111] Code that was designed (or that can be applied) to encode information into the four-base-pair alphabet of a DNA molecule.
- Deligne-Lusztig code[112–115] Evaluation code of polynomials evaluated on points lying on a Deligne-Lusztig curve.
- Delsarte-Goethals (DG) code[116] Member of a family of \((2^{2t+2},2^{(2t+1)(t-d+2)+2t+3},2^{2t+1}-2^{2t+1-d})\) binary nonlinear codes for parameters \(r \geq 1\) and \(m = 2t+2 \geq 4\), denoted by DG\((m,r)\), that generalizes the Kerdock code.
- Denniston code[117] Projective code that is part of a family of \([2^{a+i}+2^i-2^a,3,2^{a+i}-2^a]_{GF(2^a)}\) codes for \(i < a\) constructed using Denniston arcs.
- Determinant code[118] Determinant codes give optimal exact repair regenerating codes for any \([n,k,d=k]\) at all the points of the storage bandwidth trade-off curve. The codes are linear, and the exact regenerating property is provided based on fundamental properties of matrix determinants. The field size \(q\) required for this code construction is linear in \(n\).
- Diagonal code[119] Member of an explicit family of high-rate \([n,k,d,\alpha, \beta = \frac{\alpha}{d-k+1}, M=k\alpha]\) MSR codes for any \(r\) and \(n\). Such codes can optimally repair any \(f\) failed nodes from any \(d\) helper nodes for all \(d\), \(1 \le f \le r\) and \(k \le d \le n-f\) simultaneously. These codes can be constructed over any base field \(GF(q)\) as long as \(|GF(q)| \ge sn\), where \(s = \text{lcm}(1,2,\cdots,r)\).
- Difference-set cyclic (DSC) code[120] Cyclic LDPC code constructed deterministically from a difference set. Certain DCS codes satisfy more redundant constraints than Gallager codes and thus can outperform them [121].
- Dinur code[122] Member of infinite family of locally testable \([n,n/\text{polylog}(n),d]\) codes with vanishing rate. Code construction relies on a construction utilizing tensor-product codes [123].
- Disphenoidal 288-cell code Spherical \((4,48,2-\sqrt{2})\) code [60; Exam. 1.2.6] whose codewords are the vertices of the disphenoidal 288-cell. Codewords are the union of two 24-point lattice shells of the \(D_4\) lattice. The first shell consists of the 24 permutations of the four vectors \((0,0,\pm 1,\pm 1)\), and the second of the 16 vectors \((\pm 1,\pm 1,\pm 1,\pm 1)\) and the 8 permutations of the vectors \((0,0,0,\pm 2)\). A realization in terms of quaternion coordinates yields the 48 elements of the binary octahedral group \(2O\) [6; Sec. 8.6].
- Distributed computation code Encoding that provides an extra redundancy for distributed matrix computation algorithms such as matrix multiplication. Parallelized algorithms distribute a desired computation over many nodes, and a key performance bottleneck is due to some nodes completing their individual tasks much later than other nodes. Matrix computation codes provide a layer of redundancy such that the computation can be performed without having all nodes finish their piece of the computation.
- Distributed-storage code Block code designed to encode information into spatial nodes such that it is possible to recover said information after failure of some helper nodes by accessing the remaining nodes with minimal bandwidth.
- Divisible code[124] A linear \(q\)-ary block code is \(\Delta\)-divisible if the Hamming weight of each of its codewords is divisible by divisor \(\Delta\). A \(2\)-divisible (\(4\)-divisible, \(8\)-divisible) code is called even (doubly even, triply even) [55,125]. A code is called singly-even if all codewords are even and at least one has weight equal to 2 modulo 4. More generally, a code is \(m\)-even if it is \(2^{m}\)-divisible.
- Dodecacode[126] The unique trace-Hermitian self-dual additive \((12,4^6,6)_4\) code. Its codewords are cyclic permutations of \((\omega 10100100101)\), where \(GF(4)=\{0,1,\omega,\bar{\omega}\}\) is the quaternary Galois field [127; Sec. 2.4.8]. Another generator matrix can be found in [128; Exam. 9.10.8].
- Dodecahedron code Spherical \((3,20,2-2\sqrt{5}/3)\) code whose codewords are the vertices of the dodecahedron (alternatively, the centers of the faces of a icosahedron, the dodecahedron's dual polytope).
- Dual additive code For any \(q\)-ary additive code \(C\), the dual additive (or orthogonal additive) code is \begin{align} C^\perp = \{ y\in GF(q)^{n} ~|~ x \star y=0 \forall x\in C\}, \tag*{(2)}\end{align} where the trace inner product is \(x\star y = \sum_{i=1}^n \text{tr}(x_i y_i)\) for coordinates \(x_i,y_i\) and for \(\textit{tr}\) being the field trace.
- Dual code over \(R\) For any linear code \(C\) over a ring \(R\), the dual code over \(R\) is \begin{align} C^\perp = \{ y\in R^{n} ~|~ x \cdot y=0 \forall x\in C\}, \tag*{(3)}\end{align} where the ordinary, standard, or Euclidean inner product is \(x\cdot y = \sum_{i=1}^n x_i y_i\) for coordinates \(x_i,y_i\).
- Dual lattice a.k.a. Reciprocal lattice, Polar lattice.For any dimensional lattice \(L\), the dual lattice is the set of vectors whose inner products with the elements of \(L\) are integers.
- Dual linear code a.k.a. Orthogonal linear code.For any \([n,k]_q\) linear code \(C\), the dual code is the set of \(q\)-ary strings that are orthogonal to the codewords of \(C\) under a particular inner product.
- Dual polytope code For any spherical code whose codewords are vertices of a polytope, the dual code consists of codewords that are centers of the faces of said polytope. The dual codewords make up the vertices of the polytope dual to the original polytope.
- EVENODD code[129] A binary array code that can correct any two disk failures (i.e., two erasures). See [41] for more details.
- Editing code[130] a.k.a. Insertion and deletion code.A code designed to protect against insertions, where a new symbol is added somewhere within the string, and deletions, where a symbol at an unknown location is erased.
- Elliptic code Evaluation AG code of rational functions evaluated on points lying on an elliptic curve, i.e., a curve of genus one.
- Error-correcting code (ECC) Code designed for transmission of classical information through classical channels in a robust way.
- Error-correcting output code (ECOC)[131,132] A length-\(n\) binary or ternary (over \(\{\pm 1,0\}\)) block code used to convey information about classes to classifiers in multiclass machine learning. Rows of the code's generator matrix denote different classes, while columns correspond to classifiers. The \(\pm 1\) elements can be used to distinguish between a pair of chosen classes, while a zero entry correspond to a classifier ignoring that particular class.
- Evaluation AG code Evaluation code over \(GF(q)\) on a set of points \({\cal P} = \left( P_1,P_2,\cdots,P_n \right)\) in \(GF(q)\) lying on an algebraic curve \(\cal X\) whose corresponding vector space \(L\) of functions \(f\) consists of certain polynomials or rational functions.
- Evaluation code[133–135] Code whose codewords are evaluations of functions at certain fixed points. Code properties can be inferred from the structure of the functions and the underlying geometric object containing the points, often using results from algebraic geometry.
- Expander code[136] a.k.a. Sipser-Spielman code.LDPC code whose parity-check matrix is derived from the adjacency matrix of bipartite expander graph [137] such as a Ramanujan graph or a Cayley graph of a projective special linear group over a finite field [138,139]. Expander codes admit efficient encoding and decoding algorithms and yield an explicit (i.e., non-random) asymptotically good LDPC code family.
- Extended GRS code A GRS code with an additional parity-check coordinate with corresponding evaluation point of zero. In other words, an \([n+1,k,n-k+2]_q\) GRS code whose polynomials are evaluated at the points \((\alpha_1,\cdots,\alpha_n,0)\). The case when \(n=q-1\), multipliers \(v_i=1\), and \(\alpha_i\) are \(i-1\)st powers of a primitive \(n\)th root of unity is an extended narrow-sense RS code.
- Extended IRA (eIRA) code[140–142] A generalization of the IRA code in which the outer LDGM code is replaced by a random sparse matrix containing no weight-two columns.
- Fibonacci code[73] The code is defined on an \(L\times L/2\) lattice with one bit on each site, where \(L=2^N\) for an integer \(N\geq 2\). The codewords are defined to satisfy the condition that, for each lattice site \((x,y)\), the bits on \((x,y)\), \((x+1,y)\), \((x-1,y)\) and \((x,y+1)\) (where the lattice is taken to be periodic in both directions) contain an even numbers of \(1\)'s. The codewords can be generated using a one-dimensional cellular automaton of length \(L\) (periodic). The \(2^L\) possible initial states correspond to the \(2^L\) codewords. For each generation, the state of each cell is the xor sum of that cell and its two neighbors in the previous generation. After \(L/2-1\) generations, the entire history generated by the automaton corresponds to a codeword, where the initial state is the first row of the lattice, the first generation is the second row, etc.
- Finite-dimensional error-correcting code (ECC)[143] An error-correcting code defined over a finite alphabet.
- Finite-geometry LDPC (FG-LDPC) code[144] LDPC code whose parity-check matrix is the incidence matrix of points and hyperplanes in either a Euclidean or a projective geometry. Such codes are called Euclidean-geometry LDPC (EG-LDPC) and projective-geometry LDPC (PG-LDPC), respectively. Such constructions have been generalized to incidence matrices of hyperplanes of different dimensions [145].
- Flag-variety code[146] Evaluation code of polynomials evaluated on points lying on a flag variety.
- Folded RS (FRS) code[147] A linear \([n/m,k]_{q^m}\) code that is a modification of an \([n,k]_q\) RS code such that evaluations are grouped to yield a code with smaller length. In this case, the evaluation points are all powers of a generating field element \(\gamma\), \(\alpha_i=\gamma^i\). Each codeword \(\mu\) of an \(m\)-folded RS code is a string of \(n/m\) symbols, with each symbol being a string of values of a polynomial \(f_\mu\) at consecutive powers of \(\gamma\), \begin{align} \begin{split} \mu\to&\Big(\left(f_{\mu}(\alpha^{0}),\cdots,f_{\mu}(\alpha^{m-1})\right),\left(f_{\mu}(\alpha^{m}),\cdots,f_{\mu}(\alpha^{2m-1})\right)\cdots\\&\cdots,\left(f_{\mu}(\alpha^{n-m}),\cdots,f_{\mu}(\alpha^{n-1})\right)\Big)~. \end{split} \tag*{(4)}\end{align}
- Fountain code[148] Code based on the idea of generating an endless stream of custom encoded packets for the receiver. The code is designed so that the receiver can recover the original transmission of size \(Kl\) bits after receiving at least \(K\) packets each of \(l\) bits.
- Frameproof (FP) code[149,150] A block code designed to prevent a group of users from framing another user outside of the group for creating an unauthorized copy of data. FP codes help to provide software protection from the illegal distribution and copying of computer software and copyrighted materials. These codes help protect products of distributors as well as other naive users from being framed for illegal activity [151].
- Frequency-shift keying (FSK) code A \(q\)-ary frequency-shift keying (\(q\)-FSK) encodes one \(q\)-ary digit of information into signals with \(q\) different frequencies.
- Gabidulin code[152–154] a.k.a. Vector rank-metric code, Delsarte-Gabidulin code.A linear code over \(GF(q^N)\) that corrects errors over rank metric instead of the traditional Hamming distance. Every element \(GF(q^N)\) can be written as an \(N\)-dimensional vector with coefficients in \(GF(q)\), and the rank of a set of elements is rank of the matrix formed by their coefficients.
- Gallager (GL) code[155,156] The first LDPC code. The rows of the parity check matrix of this regular code are divided into equal subsets, and columns in the first subset are randomly permuted to yield the corresponding rows in subsequent subsets.
- Gauss' law code[157,158] An \([m+Dm,Dm,3]\) linear binary code for \(m\geq 3^D\), defined by the Gauss' law constraint of a \(D\)-dimensional fermionic \(\mathbb{Z}_2\) gauge theory [158; Thm. 1]. The code can be re-phrased as a distance-one stabilizer code whose stabilizers consist of gauge-group elements. It can be concatenated to form a stabilizer code for fault-tolerant quantum simulation of the underlying gauge theory [157,158].
- Generalized EVENODD code[159] a.k.a. Blaum-Bruck-Vardy array code.
- Generalized Gallager code[160] A LDPC code that generalizes the Gallager codes using the Tanner construction. While Gallager code parity-check matrices consists of repetition code submatrices that are randomly permuted, generalized Gallager code matrices substitute general binary linear codes.
- Generalized RM (GRM) code[161–163] Reed-Muller code GRM\(_q(r,m)\) of length \(n=q^m\) over \(GF(q)\) with \(0\leq r\leq m(q-1)\). Its codewords are evaluations of the set of all degree-\(\leq r\) polynomials in \(m\) variables at the points of \(GF(q)\).
- Generalized RS (GRS) code An \([n,k,n-k+1]_q\) linear code that is a modification of the RS code where codeword polynomials are multiplied by additional prefactors.
- Generalized Srivastava code[164] An \([n,k \geq n-mst,d \geq st+1 ]_q\) alternant code defined for \(n+s\) distinct elements \(\alpha_1,\alpha_2,\cdots,\alpha_n,w_1,w_2,\cdots,w_s\) and \(n\) nonzero elements \(z_1,z_2,\cdots,z_n\) of \(GF(q^m)\).
- Generalized concatenated code (GCC)[165,166] a.k.a. Cascade code.A code that combines multiple outer codes of the same length and (possibly) different dimensions with a single inner code; see Refs. [167][26; Ch. 18].
- Glynn code[168] The unique trace-Hermitian self-dual \([10,5,6]_9\) code, constructed using a 10-arc in \(PG(4,9)\) that is not a rational curve.
- Goethals code[169] Member of a family of \((2^m,2^{2^m-3m+1},8)\) binary nonlinear codes for \(m \geq 6\) that generalizes the Preparata codes. The code can be constructed as disjoint union of cosets of a certain linear code [26; Ch. 15].
- Golay code[170] A \([23, 12, 7]\) perfect binary linear code with connections to various areas of mathematics, e.g., lattices [55] and sporadic simple groups [26]. Adding a parity bit to the code results in the self-dual \([24, 12, 8]\) extended Golay code. Up to equivalence, both codes are unique for their respective parameters [171]. Shortening the Golay code yields the \([22,10,8]\), \([22,11,7]\), and \([22,12,6]\) shortened Golay codes [172]. The dual of the Golay code is its \([23,11,8]\) even-weight subcode [173,174].
- Gold code[175] Member of the family of \([2^r-1, 2r ]\) cyclic binary linear codes characterized by the generator polynomial of degree \(r\) of two maximum-period sequences of period \(2^r-1\) with absolute cross-correlation \( \leq 2^{(r+2)/2}\). Gold codewords are generated using \(m\)-sequences \(x\) and \(y\), which are codewords of simplex codes with check polynomials of degree \(r\) [175].
- Goldreich-Sudan code[176] Locally testable \([n,k,d]\) code with \(n = k^{1+O(1/u)}\) and distance of order \(\Omega(n)\) for query complexity \(u\). The same work also presented a probabilistic construction of codes of size \(k^{1+o(1)}\).
- Goppa code[177–179] a.k.a. LG code.Let \( G(x) \) be a polynomial describing a projective-plane curve with coefficients from \( GF(q^m) \) for some fixed integer \(m\). Let \( L \) be a finite subset of the extension field \( GF(q^m) \) where \(q\) is prime, meaning \( L = \{\alpha_1, \cdots, \alpha_n\} \) is a subset of nonzero elements of \( GF(q^m) \). A Goppa code \( \Gamma(L,G) \) is an \([n,k,d]_q\) linear code consisting of all vectors \(a = a_1, \cdots, a_n\) such that \( R_a(x) =0 \) modulo \(G(x)\), where \( R_a(x) = \sum_{i=1}^n \frac{a_i}{z - \alpha_i} \).
- Graph-adjacency code[180,181] Binary linear code whose generator matrix forms the adjacency matrix of a strongly regular graph. Given an adjacency matrix \(A\), the generator matrix is either \(G=A\) or \(G=(I|A)\), where \(I\) is the identity matrix.
- Grassmannian code[182–184] Evaluation code of polynomials evaluated on points lying on a Grassmannian \({\mathbb{G}}(\ell,m)\) [185].
- Gray code[186–188] The first Gray code [186], now called the binary reflected Gray code, is a trivial \([n,n,1]\) code that orders length-\(n\) binary strings such that nearest-neighbor strings differ by only one digit.
- Griesmer code[189–191] A type of \(q\)-ary code whose parameters satisfy the Griesmer bound with equality.
- Group-algebra code[192] a.k.a. \(G\) code.An \( [n,k]_q \) code whose automorphism group includes a finite group \( G \) of size \(n \), which acts on the code via its regular representation. This makes the code a \(G\)-submodule of the module \(GF(q)^n\) [194][193; Lemma 2.3]. A group-algebra code for an Abelian group is called an Abelian group-algebra code.
- Group-alphabet code Encodes \(K\) states (codewords) in coordinates labeled by elements of a group \(G\). The number of codewords may be infinite for infinite groups, so various restricted versions have to be constructed in practice.
- Group-orbit code Code whose set of codewords forms an orbit of some reference codeword under a subgroup of the automorphism group, i.e., the group of distance-preserving transformations on the metric space defined with the code's alphabet.
- Hadamard code a.k.a. Walsh code, Walsh-Hadamard code.An \([2^m,m,2^{m-1}]\) balanced binary code. The \([2^m,m+1,2^{m-1}]\) augmented Hadamard code is the first-order RM code (a.k.a. RM\((1,m)\)), while the \([2^m-1,m,2^{m-1}]\) shortened Hadamard code is the simplex code (a.k.a. RM\(^*(1,m)\)).
- Hansen toric code[195,196] Evaluation code of a linear space of polynomials evaluated on points lying on an affine or projective toric variety. If the space is taken to be all polynomials up to some degree, the code is called a toric RM-type code of that degree.
- Hergert code[116] a.k.a. Goethals-Delsarte (GD) code.A nonlinear subcode of an RM code that is a formal dual of the nonlinear DG code in the sense that its distance distribution is equal to the MacWilliams transform of the distance distribution of a DG codes.
- Hermitian code[197,198][134; Sec. 4.4.3] Evaluation AG code of rational functions evaluated on points lying on a Hermitian curve in either affine or projective space. Hermitian codes improve over RS codes in length: that RS codes have length at most \(q+1\) while Hermitian codes have length \(q^3 + 1\).
- Hermitian-hypersurface code[199] Evaluation code of polynomials evaluated on points lying on a Hermitian hypersurface.
- Hessian polyhedron code[200,201] a.k.a. Schläfli configuration.Spherical \((6,27,3/2)\) code whose codewords are the vertices of the Hessian complex polyhedron and the \(2_{21}\) real polytope. Two copies of the code yield the \((6,54,1)\) double Hessian polyhedron (a.k.a. diplo-Schläfli) code. The code can be obtained from the Schläfli graph [60; Ch. 9]. The (antipodal pairs of) points of the (double) Hessian polyhedron correspond to the 27 lines on a smooth cubic surface in the complex projective plane [69,202–204].
- Hexacode[55,205] The \([6,3,4]_4\) self-dual MDS code that has connections to projective geometry, lattices [55], and conformal field theory [206]. Puncturing the code yields the perfect \([5,3,3]_4\) quaternary Hamming code known as the shortened hexacode or shorter hexacode [207]. Both codes are sometimes refereed to as Golay codes over \(GF(4)\).
- Higman-Sims graph-adjacency code[180,181] A graph-based code whose generator matrix is constructed using the adjacency matrix \(A\) of the Higman-Sims graph. Setting the generator matrix \(G=(I|A)\) yields a \([100,22,32]\) code whose dual is an optimal \([100,78,8]\) code [180; Table VI].
- Hill projective-cap code[208] Member of a projective code family that contains of \(q\)-ary sharp configurations and that is constructed using projective caps.
- Hirschfeld code[209] A projective geometry code that is an example of an MDS code that is not an RS code; see [210; Exam. 7.6] for the description.
- Hoffman-Singleton cycle code[180,181] A \([50,21,12]\) cycle code whose parity-check matrix is the incidence matrix of the Hoffman-Singleton graph [211]. Its dual is a \([50,29,8]\) code [180; Table II].
- Hoffman-Singleton graph-adjacency code[180,181] A graph-based code whose generator matrix is constructed using the adjacency matrix of the Hoffman-Singleton graph [211]. Setting the generator matrix equal to the adjacency matrix, \(G=A\), yields a \([50,22,7]\) code whose dual is a \([50,28,8]\) code [180; Table III].
- Honeycomb tiling a.k.a. Hexagonal tiling.A two-dimensional point set whose points are vertices of hexagons. It is not a lattice since its points do not form a group under addition. As a tiling, its dual (whose points lie at the centers of each triangle) is the triangular tiling. The ruby tiling is a fattened honeycomb tiling interpolating between the honeycomb tiling and triangular lattice.
- Hsu-Anastasopoulos LDPC (HA-LDPC) code[212] A regular LDPC code obtained from a concatenation of a certain random regular LDPC code and a certain random LDGM code. Using rate-one LDGM codes eliminates high-weight codewords while admitting an amount of low-weight codewords that asymptotically vanishes, allowing code families to achieve the GV bound with high probability.
- Hyperbolic evaluation code[213–215] a.k.a. Hyperbolic cascaded RS code.An evaluation code over polynomials in two variables. Generator matrices are determined in Ref. [215] following initial formulations of the codes as generalized concatenations of RS codes [213,214]; see [133; Exam. 4.26].
- Hyperbolic sphere packing[216,217] Encodes states (codewords) into coordinates in the hyperbolic plane \(\mathbb{H}^2\).
- Hypercube code Spherical \((n,2^n,4/n)\) code whose codewords are vertices of an \(n\)-cube, i.e., all permutations and negations of the vector \((1,1,\cdots,1)\), up to normalization.
- Hyperoval code[218] A projective code constructed using hyperovals in projective space.
- Icosahedron code Spherical \((3,12,2-2/\sqrt{5})\) code whose codewords are the vertices of the icosahedron (alternatively, the centers of the faces of a dodecahedron, the icosahedron's dual polytope).
- Identifiable parent property (IPP) code[219] A code that is embedded in copyrighted content in order to detect unauthorized redistribution of said content by pirates. IPP codes are designed to detect pirates even when segments content are mixed together so as to conceal the pirates' identities.
- Incidence-matrix projective code[220–222] Code whose generator matrix is the incidence matrix of points and hyperplanes in a projective space. Has been generalized to incidence matrices of other structures [223,224][225; Sec. 14.4]. Columns of a code's parity-check matrix can similarly correspond to an incidence matrix.
- Interleaved RS (IRS) code A modification of RS codes where multiple polynomials are used to define each codeword. Each codeword \(\mu\) of a \(t\)-interleaved RS code is a string of values of the corresponding set \(\{f_\mu^{(1)},f_\mu^{(2)},\cdots,f_\mu^{(t)}\}\) of \(t\) polynomials at the points \(\alpha_i\). The vector codewords can be arranged in an array whose rows are ordinary RS codes for each polynomial \(f^{j}\), yielding the encoding \begin{align} \mu\to\left( \begin{array}{cccc} f_{\mu}^{(1)}\left(\alpha_{1}\right) & f_{\mu}^{(1)}\left(\alpha_{2}\right) & \cdots & f_{\mu}^{(1)}\left(\alpha_{n}\right)\\ f_{\mu}^{(2)}\left(\alpha_{1}\right) & f_{\mu}^{(2)}\left(\alpha_{2}\right) & & f_{\mu}^{(2)}\left(\alpha_{n}\right)\\ \vdots & & \ddots & \vdots\\ f_{\mu}^{(t)}\left(\alpha_{1}\right) & f_{\mu}^{(t)}\left(\alpha_{2}\right) & \cdots & f_{\mu}^{(t)}\left(\alpha_{n}\right) \end{array}\right)~. \tag*{(5)}\end{align}
- Irregular LDPC code[226,227] An LDPC code whose parity-check matrix has a variable number of entries in each row or column.
- Irregular repeat-accumulate (IRA) code[228–230] A generalization of the RA code in which the outer 1-in-3 repetition encoding step is replaced by an LDGM code. A simple version is when different bits in the RA block are repeated a different number of times.
- Julin-Golay code[54,231,232] One of several nonlinear binary \((12,144,4)\) codes based on the Steiner system \(S(5,6,12)\) [233,234][26; Sec. 2.7][235; Sec. 4] or their shortened versions, the nonlinear \((11,72,4)\), \((10,38,4)\), and \((9,20,4)\) Julin-Golay codes. Several of these codes contain more codewords than linear codes of the same length and distance and yield non-lattice sphere-packings that hold records in 9 and 11 dimensions.
- Justesen code[236] Binary linear code resulting from generalized concatenation of an outer RS code with multiple inner codes sampled from the Wozencraft ensemble, i.e., \(N\) distinct binary inner codes of dimension \(m\) and length \(2m\). The first asymptotically good codes.
- Kasami code[237] Member of the family of \([2^{2r}-1, 3r, 2^{2r-1} - 2^{r-1} ]\) cyclic binary linear codes.
- Kerdock code[238] Binary nonlinear \((2^m, 2^{2m}, 2^{m-1} - 2^{(m-2)/2})\) for even \(m\) consisting of the first-order Reed-Muller code RM\((1,m)\) with maximum-rank cosets of RM\((1,m)\) in RM\((2,m)\).
- Kerdock spherical code[239–241] Family of \((n=2^{2r},n^2,2-2/\sqrt{n})\) spherical codes for \(r \geq 2\), obtained from Kerdock codes via the antipodal mapping [60; pg. 157]. These codes are optimal for their parameters for \(2\leq r\leq 5\), they are unique for \(r\in\{2,3\}\), and they form spherical 3-designs because their codewords are unions of \(2^{2r-1}+1\) cross polytopes [242].
- Klein-quartic code[243] Evaluation AG code over \(GF(8)\) of rational functions evaluated on points lying on the Klein quartic, which is defined by the equation \(x^3 y + y^3 z + z^3 x = 0\) ([133], Exam. 2.75).
- Kopparty-Meir-Ron-Zewi-Saraf (KMRS) code[244,245] Member of a family of locally testable binary linear codes with constant rate, constant relative distance, and subpolynomial query complexity \(u = (\log n)^{O(\log \log n)}\)). Later work by Gopi, Kopparty, Oliveira, Ron-Zewi, and Saraf [245] showed that related concatenated codes achieve the GV bound.
- LDPC convolutional code (LDPC-CC)[246–248] a.k.a. Low-density convolutional (LDC) code.Convolutional code defined by an infinite low-density parity-check matrix.
- Laminated spherical code[249] Spherical code whose codewords are obtained from a recursive procedure that is similar to the procedure that creates laminated lattices.
- Lattice-based code Encodes states (codewords) in coordinates of an \(n\)-dimensional lattice, i.e., a discrete set of points in Euclidean space \(\mathbb{R}^n\) that forms a group under vector addition when the set is translated such that one point is at the origin. The number of codewords may be infinite because the coordinate space is infinite-dimensional, so various restricted versions have to be constructed in practice. Since lattices are closed under addition, lattice-based codes can be thought of as linear codes over the reals.
- Lattice-shell code[250,251] Spherical code whose codewords are scaled versions of points on a lattice. A \(m\)-shell code consists of normalized lattice vectors \(x\) with squared norm \(\|x\|^2 = m\). Each code is constructed by normalizing a set of lattice vectors in one or more shells, i.e., sets of lattice points lying on a hypersphere.
- Lazebnik-Ustimenko (LU) code[252,253] LDPC code whose Tanner graph comes from a particular family of \(q\)-regular graphs [252] of known girth and relatively large stopping sets.
- Left-right Cayley complex code[254] Binary code constructed on a left-right Cayley complex using a pair of base codes \(C_A,C_B\) and an expander graph [137] such that codewords for a fixed graph vertex are codewords of the tensor code \(C_A \otimes C_B\). A family of such codes is one of the first \(c^3\)-LTCs.
- Levenshtein code[255] Binary codes constructed from combining two codes \(A'\) constructed out of Hadamard matrices.
- Lexicographic code[256,257] A \(q\)-ary code whose codewords are constructed greedily and iteratively by starting with zero and adding codewords whose distance is the desired minimum distance of the code.
- Linear STC Spacetime code whose set of matrix codewords is closed under addition and subtraction.
- Linear \(q\)-ary code An \((n,K,d)_q\) linear code is denoted as \([n,k,d]_q\), where \(k=\log_q K\) need not be an integer. Its codewords form a linear subspace, i.e., for any codewords \(x,y\), \(\alpha x+ \beta y\) is also a codeword for any \(q\)-ary digits \(\alpha,\beta\). This extra structure yields much information about their properties, making them a large and well-studied subset of codes.
- Linear binary code An \((n,2^k,d)\) linear code is denoted as \([n,k]\) or \([n,k,d]\), where \(d\) is the code's distance. Its codewords form a linear subspace, i.e., for any codewords \(x,y\), \(x+y\) is also a codeword. A code that is not linear is called nonlinear.
- Linear code over \(G\)[258–260] Block code that encodes \(K\) states (codewords) in \(n\) coordinates over a group \(G\) such that the codewords form a subgroup of \(G^n\). In other words, the set of codewords is closed under the group operation.
- Linear code with complementary dual (LCD)[261] A linear code \(C\) admits a complementary dual if \(C\) and its dual code \(C^{\perp}\) do not share any codewords.
- Linearized RS code[262–264]
- Locally correctable code (LCC) Recall that a block code encodes a length-\(k\) message into a length-\(n\) codeword, which is then sent through a noise channel to yield an error word. Informally, an LCC is a block code for which one can recover any coordinate of a codeword from at most \(r\) coordinates of the error word (assuming the error word is within some tolerated corruption rate \(\delta\)).
- Locally decodable code (LDC)[265] Recall that a block code encodes a length-\(k\) message into a length-\(n\) codeword, which is then sent through a noise channel to yield an error word. Informally, an LDC is a block code for which one can recover any coordinate of the message from at most \(r\) coordinates of the error word (assuming the error word is within some tolerated corruption rate \(\delta\)). Efficiency of the correction is quantified by the code's query complexity \(r\), and correction is performed by sampling subsets of \(r\) bits.
- Locally recoverable code (LRC) a.k.a. Locally repairable code.An LRC is a block code for which one can recover any coordinate of a codeword from at most \(r\) other coordinates of the codeword. In other words, an LRC of locality \(r\) is a block code for which, given a codeword \(c\) and coordinate \(c_i\), \(c_i\) can be recovered from at most \(r\) other coordinates of \(c\). An \(r\)-locally recoverable code of length \(n\) and dimension \(k\) is denoted as an \((n,k,r)\) LRC. The definition can be generalized to \(t\)-LRC, if every coordinate is recoverable from \(t\) disjoint subsets of coordinates.
- Locally testable code (LTC)[266–269] Code for which one can efficiently check whether a given string is a codeword or is far from a codeword. Efficiency of the verification is quantified by the code's query complexity \(u\), while effectiveness is quantified by the code's soundness \(R\).
- Long code[270,271] Locally testable \([2^{2^k},k,d]\) code. The encoder maps a \(k\)-bit string into a codeword that consists of the values of all Boolean functions on the \(k\)-bit string. The code is not practical, but is useful for certain probabilistically checkable proof (PCP) constructions [272].
- Low-density generator-matrix (LDGM) code Binary linear code with a sparse generator matrix. Alternatively, a member of an infinite family of \([n,k,d]\) codes for which the number of nonzero entries in each row and column of the generator matrix are both bounded by a constant as \(n\to\infty\). The dual of an LDGM code has a sparse parity-check matrix and is called an LDPC code.
- Low-density parity-check (LDPC) code[155,156] a.k.a. Sparse graph code.A binary linear code with a sparse parity-check matrix. Alternatively, a member of an infinite family of \([n,k,d]\) codes for which the number of nonzero entries in each row and column of the parity-check matrix are both bounded above by a constant as \(n\to\infty\).
- Low-rank parity-check (LRPC) code[273] An LRPC code of rank \(d\) is a rank-metric code that, when interpreted as a linear code over \(GF(q^m)\), admits an \((n-k)\times n\) parity-check matrix whose entries span a subspace of \(GF(q^m)\) that is at most \(d\)-dimensional.
- Luby transform (LT) code[274] Erasure codes based on fountain codes. They improve on random linear fountain codes by having a much more efficient encoding and decoding algorithm.
- MDS array code An \((n,k,m)\) array code whose codewords can be recovered by any \(k\) out of \(n\) nodes, where each node stores a length-\(m\) column of the codeword. MDS array codes are MDS codes when each matrix codeword is treated as a vector by converting each column into a single coordinate via subpacketization.
- MacKay-Neal LDPC (MN-LDPC) code[275,276] Codes whose parity-check matrix is constructed non-deterministically via the MacKay-Neal prescription. The parity-check matrix of an \((l,r,g\))-MN-LDPC code is of the form \((H_1~H_2)\), where \(H_1\) is a random binary matrix of column weight \(l\) and row weight \(r\), and \(H_2\) is a random binary matrix of column and row weight \(g\) [277].
- Margulis LDPC code[9]
- Matrix-based code a.k.a. Two-dimensional code.Encodes \(K\) states (codewords) in an \(m\times n\)-dimensional matrix of coordinates over a field (e.g., the Galois field \(GF(q)\) or the complex numbers \(\mathbb{C}\)).
- Matrix-product code[279] Code constructed using a concatenation procedure that yields a code consisting of all products of codewords in \(M\) length-\(n\) \(q\)-ary codes and an \(M\times N\) \(q\)-ary matrix with \(N\geq M\). A prominent subclass is the case with \(A\) is non-singular by columns (NSC).
- Maximally recoverable (MR) code[280,281] a.k.a. Partial MDS code.A code with \((r,\delta)\) locality such that puncturing it on any \(\delta-1\) coordinates of the local \([r+\delta-1,r,\delta]\) codes yields an MDS code.
- Maximum distance separable (MDS) code[282] A type of \(q\)-ary code whose parameters satisfy the Singleton bound with equality.
- Maximum-rank distance (MRD) code[153,154,283] a.k.a. Optimal rank-distance code.An \([n\times m,k,d]_q\) rank-metric code whose parameters are such that the Singleton-like bound \begin{align} k \leq \max(n, m) (\min(n, m) - d + 1) \tag*{(6)}\end{align} becomes an equality.
- Maximum-sum-rank distance (MSRD) code[264] a.k.a. Optimal sum-rank-distance code.An \([n\times m,k,d]_q\) rank-metric code whose parameters are such that the sum-rank-metric Singleton bound [264; Prop. 34] \begin{align} d_{\text{SR}}(C) \leq n - k + 1 \tag*{(7)}\end{align} becomes an equality, where \(d_{\text{SR}}\) is the sum-rank metric.
- Meir code[284] Locally testable \([n,k,d]_q\) code with query complexity \(\text{poly}(\log k)\) and rejection ratio \(R/n = 1/\text{poly}(\log k)\). Code construction is probabilistic and combinatorial.
- Melas code[285,286] Cyclic \([2^m -1, 2^m - 1 - 2m, 5]\) linear code with generator polynomial is \(g(x) = p(x)p(x)^{\star}\), where \(p(x)\) is a primitive polynomial of degree \(m\) that is the minimal polynomial over \(GF(2)\) of an element \(\alpha\) of order \(2^m -1\) in \(GF(2^m)\), \(m\) is odd and greater that five, and '\(\star\)' denotes reciprocation [287].
- Minimum-bandwidth regenerating (MBR) code An RGC that corresponds to an extreme point in the storage-bandwidth trade-off curve that is characterised by \(\alpha = d\beta\).
- Minimum-storage regenerating (MSR) code An RGC that corresponds to an extreme point in the storage-bandwidth trade-off curve that is characterised by \(\alpha = (d-k+1)\beta\).
- Mixed code a.k.a. Mixed-alphabet code.Encodes \(K\) states (codewords) in a string of two or more coordinates, each of which takes values in one of two or more possible groups.
- Modulation scheme
- Multi-channel group-orbit code[290] Extension of binary group-orbit codes to multi-antenna transmission.
- Multi-edge LDPC code[291] Irregular LDPC code whose construction generalizes those of the original examples of irregular LDPC as well as RA codes.
- Multiplicity code[292–294] A generalization of an \(m\)-variate polynomial evaluation code based on evaluating polynomials and \(s\) of their derivatives at all points in \(GF(q)^m\). Originally proposed for coding using the Rosenbloom-Tsfasman metric [292]. Univariate (\(m=1\)) [292,293] and multivariante (\(m>1\)) [294] codes have been proposed.
- Nadler code[295] A nonlinear \((12,32,5)\) binary code that is the largest double-error-correcting code.
- Narrow-sense RS code[205,296,297] An \([q-1,k,n-k+1]_q\) RS code whose points \(\alpha_i\) are all \((i-1)\)st powers of a primitive element \(\alpha\) of \(GF(q)\).
- Nearly perfect code[298–300] A type of binary code whose parameters satisfy the Johnson bound with equality.
- Newman-Moore code[301] Member of a family of \([L^2,O(L),O(L^{\frac{\log 3}{\log 2}})]\) binary linear codes on \(L\times L\) square lattices that form the ground-state subspace of a class of exactly solvable spin-glass models with three-body interactions. The codewords resemble the Sierpinski triangle on a square lattice, which can be generated by a cellular automaton [302].
- Niederreiter-Rosenbloom-Tsfasman (NRT) code[292,303–305] A poset code based on the total ordering of \([n]\), i.e., \(1\leq 2\leq \cdots \leq n\).
- Niemeier lattice[306] One of the 24 positive-definite even unimodular lattices of rank 24.
- Nonlinear AG code[307–311] Nonlinear \(q\)-ary code constructed by evaluating functions on an algebraic curve.
- Nordstrom-Robinson (NR) code[312,313] A nonlinear \((16,256,6)\) binary code that is the smallest Kerdock and the smallest Preparata code. The size of this code is larger than the largest possible linear code with the same length and distance.
- Norm-trace code[314] Evaluation AG code of rational functions evaluated on points lying on a Miura-Kamiya curve in either affine or projective space. The family is named as such because the equations defining the curves can be expressed in terms of the field norm and field trace.
- Octacode[55,315,316] The unique self-dual linear code of length 8 and Lee distance 6 over \(\mathbb{Z}_4\) with generator matrix \begin{align} \begin{pmatrix} 3 & 3 & 2 & 3 & 1 & 0 & 0 & 0\\ 3 & 0 & 3 & 2 & 3 & 1 & 0 & 0\\ 3 & 0 & 0 & 3 & 2 & 3 & 1 & 0\\ 3 & 0 & 0 & 0 & 3 & 2 & 3 & 1 \end{pmatrix}\,. \tag*{(8)}\end{align}
- One-hot code[317] a.k.a. One-vs-all (OVA) code, One-against-all (1AA) code, One-vs-rest (OvR) code, \(1\)-in-\(n\) code.A length-\(n\) binary code whose codewords are those with Hamming weight one. The reverse of this code, where all codewords have Hamming weight \(n-1\) is called a one-cold code.
- One-versus-one (OVO) code[318,319] a.k.a. One-against-one (1A1) code.A length-\(n\) ternary code over \(\{\pm 1,0\}\) whose whose generator matrix has columns with one \(+1\), one \(-1\), and with the rest of the entries zero.
- Optimal LRC[320,321] An LRC whose parameters saturate a generalized Singleton bound.
- Orthogonal Spacetime Block Code (OSTBC)[8] The codewords are \(T\times n\) matrices as defined for spacetime codes, with the additional condition that columns of the coding matrix are orthogonal. The parameter \(n\) is the number of channels, and \(T\) is the number of time slots.
- Orthogonal array (OA)[322–324] An orthogonal array, or OA\(_{\lambda}(t,n,q)\), of strength \(t\) with \(q\) levels and \(n\) constraints is a set of \(q\)-ary strings such that any subset of \(t\) coordinates contains every length-\(t\) string an equal number of times \(\lambda\), which is the index of the array.
- Ovoid code[218,325] Member of a \([q^2+1,4,q^2-q]_q\) projective code family that is universally optimal and that is constructed using ovoids in projective space. See [326; pg. 107][32; pg. 192] for further details.
- Parallel concatenated code A code that is constructed by combining two or more codes in a Tanner code, in a tensor-product code, or in a modified Tanner construction [327].
- Parallel-recovery code[328] A \(t\)-erasure LRC whose coordinate erasures can be recovered in parallel.
- Parvaresh-Vardy (PV) code[329] a.k.a. Correlated RS code.An IRS code with additional algebraic relations (a.k.a. correlations) between the codeword polynomials \(\{f^{(j)}\}_{j=1}^{t}\). These relations yielded a list decoder that achieves list-decoding capacity.
- Pentacode[330] Nonlinear \((5,40,4)_{\mathbb{Z}_4}\) code over \(\mathbb{Z}_4\) whose codewords are all cyclic permutations and negations of the strings \(01112\), \(03110\), \(21310\), and \(21132\).
- Pentakis dodecahedron code Spherical \((3,32,(9-\sqrt{5})/6)\) code whose codewords are the vertices of the pentakis dodecahedron, the convex hull of the icosahedron and dodecahedron.
- Perfect binary code An \((n,K,2t+1)\) binary code is perfect if parameters \(n\), \(K\), and \(t\) are such that the binary Hamming (a.k.a. sphere-packing) bound \begin{align} \sum_{j=0}^{t} {n \choose j} \leq 2^{n}/K \tag*{(9)}\end{align} becomes an equality. For example, for a code with one logical bit (\(K=2\)) and \(t=1\), the bound becomes \(n+1 \leq 2^{n-1}\). Perfect codes are those for which balls of Hamming radius \(t\) exactly fill the space of all \(n\) binary strings.
- Perfect code A type of \(q\)-ary code whose parameters satisfy the Hamming bound with equality.
- Permutation spherical code[331,332] Slepian group-orbit code whose codewords are constructed from an arbitrary unit vector in two possible variants. Variant 1 consists of codewords that are permutations of the vector's coordinates, while Variant 2 consists of such permutations and all possible sign changes of the vector's components.
- Petersen cycle code[99] A \([15,6,5]\) cycle code whose parity-check matrix is the incidence matrix of the Petersen graph. The Petersen graph can be thought of as a dodecahedron with antipodes identified [333; Appx. A.2.1].
- Petersen spherical code[334] A \((4,10,1/6)\) spherical code whose codewords correspond to vertices of the Peterson graph. Its Gram matrix is constructed by putting \(-2/3\) whenever two vertices are adjacent in the graph, and \(1/6\) otherwise. The code is optimal for its parameters [334].
- Phase-shift keying (PSK) code A \(q\)-ary phase-shift keying (\(q\)-PSK) encodes one \(q\)-ary digit of information into a constellation of \(q\) points distributed equidistantly on a circle in \(\mathbb{C}\) or, equivalently, \(\mathbb{R}^2\).
- Plane-curve code[335] Evaluation AG code of bivariate polynomials of some finite maximum degree, evaluated at points lying on an affine or projective plane curve.
- Pless symmetry code[336,337] a.k.a. Pless double circulant code.A member of a family of self-dual ternary \([2q+2,q+1]_3\) codes for any power of an odd prime satisfying \(q \equiv 2\) modulo 3.
- Polar code[338] In its basic version, a binary linear polar code encodes \(K\) message bits into \(N=2^n\) bits. The linear transformation that defines the code is given by the matrix \(G^{(n)}=B_N G^{\otimes n}\), where \(B_N\) is a certain \(N\times N\) permutation matrix, and \(G^{\otimes n}\) is the \(n\)th Kronecker power of the \(2\times 2\) kernel matrix \(G=\left[\begin{smallmatrix}1 & 0\\ 1 & 1 \end{smallmatrix}\right]\). To encode \(K\) message bits, one forms an \(N\)-vector \(u\) in which \(K\) coordinates represent the message bits. The remaining \(N-K\) coordinates are set to some fixed values and are said to be frozen. The codeword \(x \in \{0,1\}^N\) is obtained as \(x=u G^{\otimes n}\).
- Polygon code Spherical \((1,q,4\sin^2 \frac{\pi}{q})\) code for any \(q\geq1\) whose codewords are the vertices of a \(q\)-gon. Special cases include the line segment (\(q=2\)), triangle (\(q=3\)), square (\(q=4\)), pentagon (\(q=5\)), and hexagon (\(q=6\)).
- Polyhedron code A polytope code in three dimensions, i.e., a spherical code whose codewords form vertices of a polyhedron.
- Polynomial evaluation code Evaluation code of polynomials (or, more generally, rational functions) at points \({\cal P} = \left( P_1,P_2,\cdots,P_n \right)\) on an algebraic variety \(\cal X\) of dimension greater than one (i.e., not an algebraic curve).
- Polyphase code[339–349] A spherical code obtained from a binary code, \(q\)-ary code, or \(q\)-ary code over \(\mathbb{Z}_q\) via a component-wise mapping of each \(q\)-ary digit to a \(q\)th root of unity in a generalization of the antipodal mapping.
- Polytope code
- Poset code[351] Encodes \(K\) states (codewords) in \(n\) \(q\)-ary coordinates over the field \(GF(q)\), with its distance evaluated in the poset metric.
- Preparata code[352] A nonlinear binary \((2^{m+1}-1, 2^{m+1}-2m-2, 5)\) code where \(m\) is odd. The size of this code is twice the size of the largest possible linear code with the same length and distance.
- Primitive narrow-sense BCH code[67] BCH codes for \(b=1\) and for \(n=q^r-1\) for some \(r\geq 2\).
- Private information retrieval (PIR) code[353,354] A code used to obtain information from several servers privately, i.e., without the servers knowing what information was obtained.
- Product-matrix (PM) code[355] Code constructed using two explicit constructions, with each construction corresponding to one of the two extreme points of the storage-bandwidth trade-off curve [356].
- Projective RM (PRM) code[357,358] Reed-Muller code for nonzero points \(\{\alpha_1,\cdots,\alpha_n\}\) with \(n=m+1\) whose leftmost nonzero coordinate is one, corresponding to an evaluation code of polynomials over projective coordinates.
- Projective geometry code Linear \(q\)-ary \([n,k,d]\) code such that columns of its generator matrix \(G\) does not contain any repeated columns or the zero column. That way, each column corresponds to a distinct point in the projective space \(PG(k-1,q)\) arising from a \(k\)-dimensional vector space over \(GF(q)\). If the columns are linearly independent, then the codewords are collectively called an information set. Columns of a code's parity-check matrix can similarly correspond to points in projective space. This formulation yields connections to projective geometry, which can be applied to determine code properties.
- Projective two-weight code A projective code whose codewords all have one of two possible nonzero Hamming weights.
- Protograph LDPC code[359–361] Binary version of a \(q\)-ary protograph LDPC code. Its parity check matrix can be put into the form of a block matrix consisting of either a sum of permutation sub-matrices or the zero sub-matrix.
- Pulse-amplitude modulation (PAM) code Encodes a \(q\)-ary digit into a constellation of equally spaced points on the real line. For example, a \(q\)-PAM scheme for \(q=8\) could encode the constellation \(\{ \pm \alpha,\pm 3\alpha,\pm 5\alpha, \pm 7\alpha \}\) with real scaling factor \(\alpha\). The points in the constellation are typically associated with one quadrature of an electromagnetic signal.
- Pulse-position modulation (PPM) code An analog code encoding into \(q\) different signals such that each codeword corresponds to a signal.
- Pyramid code[362] An LRC whose generator matrix is that of an RS code in standard form, but some of whose columns are split into multiple columns; see [79; Sec. 31.3.1.1] for an example.
- Quadrature PSK (QPSK) code[363] a.k.a. Quadriphase PSK code, 4-PSK code, 4-QAM code.A quaternary encoding into a constellation of four points distributed equidistantly on a circle. For the case of \(\pi/4\)-QPSK, the constellation is \(\{e^{\pm i\frac{\pi}{4}},e^{\pm i\frac{3\pi}{4}}\}\).
- Quadrature-amplitude modulation (QAM) code Encodes into points into a subset of points lying on in \(\mathbb{R}^{2}\), here treated as \(\mathbb{C}\). Each pair of points is associated with a complex amplitude of an electromagnetic signal, and information is encoded into both the norm and phase of that signal [289; Ch. 16].
- Quadric code[364,365] Evaluation code of polynomials evaluated on points lying on a quadric hypersurface.
- Quantum-inspired classical block code A block code of length \(n\) whose construction was inspired by a quantum code.
- Quasi group-algebra code a.k.a. Quasi-\(G\) code.A \(q\)-ary linear code based on a finite group \( G \) of order \(n/\ell\) for some index \(\ell\). The code is a right submodule of the direct sum of \(\ell\) copies of the group algebra \(\mathbb{F}_q G\). A quasi group-algebra code for an Abelian group is called an Abelian quasi group-algebra code.
- Quasi-cyclic LDPC (QC-LDPC) code[18,366–371][156; Appx. C] LDPC code that can be put into quasi-cyclic form. Its parity check matrix can be put into the form of a block matrix consisting of either circulant permutation sub-matrices or the zero sub-matrix. Such codes are often constructed by lifting certain protographs into such block matrices [372]. Their simple structure makes them useful for several wireless communication standards.
- Quasi-cyclic code[373] A block code of length \(n\) is quasi-cyclic if, for each codeword \(c_1 \cdots c_{\ell} c_{\ell+1} \cdots c_n\), the string \(c_{n-\ell+1} \cdots c_n c_1 \cdots c_{n-\ell}\), where each entry is cyclically shifted by \(\ell\) increments, is also a codeword.
- Quasi-perfect code Perfect codes \((n,K,d)_q\) are those for which balls of Hamming radius \(t=\left\lfloor (d-1)/2\right\rfloor\) exactly fill the space of all \(n\) \(q\)-ary strings. Quasi-perfect codes are those for which balls of Hamming radius \(t\) are disjoint, while balls of radius \(t+1\) cover the space with possible overlaps. In other words, any \(q\)-ary string is at most \(t+1\) bit flips away from a codeword of a quasi-perfect code.
- Quasi-twisted code A block code of length \(n\) is \(\alpha\)-quasi-twisted if, for each codeword \(c_1 \cdots c_{\ell} c_{\ell+1} \cdots c_n\), the string \(\alpha c_{n-\ell+1}, \alpha c_{n-\ell+2}, \cdots, \alpha c_n, c_1, c_2, \cdots, c_{n-\ell}\) is also a codeword.
- Quaternary RM (QRM) code[374] A quaternary linear code over \(\mathbb{Z}_4\) that is a quaternary version of the RM code in that its binary image under the Gray map is an RM code. This code subsumes the quaternary images of the Kerdock and Preparata codes under the Gray map. The code is usually noted as QRM\((r,m)\), with its image under the Gray map yielding the RM code RM\((r,m)\) [374; Thm. 19].
- Quaternary linear code over \(\mathbb{Z}_4\) A linear code encoding \(K\) states (codewords) in \(n\) coordinates over the ring \(\mathbb{Z}_4\) of integers modulo 4.
- RS NRT code[292] An NRT analogue of an RS code.
- Random code[143] Code whose construction is non-deterministic in some way, i.e., codes that utilize an elements of randomness somewhere in their construction. Members of this class range from fully non-deterministic codes, to codes whose multi-step construction is deterministic with the exception of a single step.
- Rank-metric code[153] a.k.a. Delsarte rank-metric code.Each codeword is a matrix over \(GF(q)\), with codewords forming a \(GF(q)\)-linear subspace, and with the metric being the rank of the difference of matrices. The distance \(d\) is the minimum rank of all nonzero matrices in the code. Rank-metric codes on \(n\times m\) matrices are denoted as \([n\times m,k,d]_q\).
- Rank-modulation code[375,376] A family of codes in permutations derived from \(q\)-ary linear codes, such as Lee-metric codes, RS codes [376], quadratic residue codes, and most binary codes.
- Raptor (RAPid TORnado) code[377,378] Raptor codes are concatenated erasure codes with two layers: an outer pre-code and a Luby-Transform (LT) inner code. The pre-code is a linear binary erasure code, which is applied first to the input to create some redundant data. The LT code is then applied to the intermediate symbols from the pre-code to generate final output symbols to be transmitted.
- Real-Clifford subgroup-orbit code[379,380] Slepian group-orbit code of dimension \(2^r\), approximate asympotic size \(2.38 \cdot 2^{r(r+1)/2+1}\), and distance \(1\). Code is constructed by applying elements of an index-two subgroup of the real Clifford group, when taken as a subgroup of the orthogonal group [381], onto the vector \((1,0,0,\cdots,0)\). This group is the automorphism group of BW lattice, and the resulting codes coincide with the optimal spherical codes for dimensions \(\{4,8,16\}\).
- Rectified Hessian polyhedron code Spherical \((6,72,1)\) code whose codewords are the vertices of the rectified Hessian complex polyhedron and the \(1_{22}\) real polytope. Codewords form the minimal lattice-shell code of the \(E_6\) lattice. See [350; pg. 127][55; pg. 126] for realizations of the 72 codewords.
- Reed-Muller (RM) code[382–384] Member of the RM\((r,m)\) family of linear binary codes derived from multivariate polynomials. The code parameters are \([2^m,\sum_{j=0}^{r} {m \choose j},2^{m-r}]\), where \(r\) is the order of the code satisfying \(0\leq r\leq m\). First-order RM codes are also called biorthogonal codes, while \(m\)th order RM codes are also called universe codes. Punctured RM codes RM\(^*(r,m)\) are obtained from RM codes by deleting one coordinate from each codeword.
- Reed-Solomon (RS) code[205,296,297] An \([n,k,n-k+1]_q\) linear code based on polynomials over \(GF(q)\).
- Regenerating code (RGC)[356] An \([n,k,d,\alpha,\beta,M]_q\) Regenerating Code \(\mathcal{C}\) is an erasure correcting code that encodes \(M\) symbols from \(GF(q)\) into an \(\alpha \times n\) matrix over \(GF(q)\), with each column of the matrix treated as a coordinate of a codeword.
- Regular LDPC code An LDPC code whose parity-check matrix has a fixed number of entries for each row or column.
- Regular binary Tanner code[385] a.k.a. Regular binary GLDPC code.A binary Tanner code defined on a regular bipartite graph, with the inner code being the same for all vertices.
- Repeat-accumulate (RA) code[386] An LDPC code whose parity-check matrix has weight-two columns arranged in a step-like pattern for its last columns [387].
- Repeat-accumulate-accumulate (RAA) code[388] Generalization of the RA code in which two accumulators and permutations are used.
- Repetition code \([n,1,n]\) binary linear code encoding one bit of information into an \(n\)-bit string. The length \(n\) needs to be an odd number, since the receiver will pick the majority to recover the information. The idea is to increase the code distance by repeating the logical information several times. It is a \((n,1)\)-Hamming code. Its automorphism group is \(S_n\).
- Residue AG code a.k.a. Differential code.Linear \(q\)-ary code defined using a set of points \({\cal P} = \left( P_1,P_2,\cdots,P_n \right)\) in \(GF(q)\) lying on an algebraic curve \(\cal X\) and a linear space \(\Omega\) of certain rational differential forms \(\omega\).
- Reversible code A code of length \(n\) over an alphabet is reversible if, for each codeword \(c_1 c_2 \cdots c_n\), the reversed string \(c_n \cdots c_2 c_1\) is also a codeword.
- Ring code Encodes \(K\) states (codewords) in \(n\) coordinates over a finite ring \(R\).
- Root lattice A lattice that is symmetric under a specific crystallographic reflection group; see [55; Table 4.1] for the list of crystallographic reflection groups and their corresponding root lattices. The root-lattice family consists of lattices \(A_n\), \(\mathbb{Z}^n\), or \(D_n\) for dimension \(n\), or \(E_{i}\) for \(i\in\{6,7,8\}\). Their generator matrices can be taken to be the root matrices of the corresponding reflection groups.
- Roth-Lempel code[389] Member of a \(q\)-ary linear code family that includes many examples of MDS codes that are not GRS codes.
- Row-Diagonal Parity (RDP) code[390] An MDS array code protecting against double erasures.
- Ruled-surface code[112,391] Evaluation code of polynomials evaluated on points lying on a ruled surface.
- Schubert code[392,393] Evaluation code of polynomials evaluated on points lying on a Schubert variety.
- Segre-variety RM-type code[394] Evaluation code of polynomials evaluated on points lying on a Segre variety.
- Self-dual additive code An additive \((n,2^n)_q\) code that is equal to its dual, \(C^\perp = C\), where the dual is defined with respect to some inner product, usually the trace-Hermitian inner product.
- Self-dual code over \(R\) An additive linear code \(C\) over a ring \(R\) that is equal to its dual, \(C^\perp = C\), where the dual is defined with respect to some inner product.
- Self-dual linear code An \([n,n/2]_q\) code that is equal to its dual, \(C^\perp = C\), where the dual is defined with respect to an inner product, most commonly either Euclidean or Hermitian. Self-dual codes exist only for even lengths and have dimension \(k=n/2\). A code that is equivalent to its dual is called iso-dual.
- Semakov-Zinoviev-Zaitsev (SZZ) equidistant code[395] Member of a family that is related to affine resolvable block designs and that is universally optimal.
- Sequential-recovery code[396,397] A \(t\)-erasure LRC whose coordinate erasures are recovered in sequential fashion.
- Sharp configuration[69,90,398] a.k.a. Delsarte code.A code \(C\) that attains a universal bound expressed in terms of the minimal distance, the number of distances between codewords, and the strength of the design formed by the codewords. For codes on a compact connected two-point homogeneous space, \(C\) is a design of strength \(M\) and admits \(m\) different distances between its points such that \(M \geq 2m - 1 - \delta\), where \(\delta\) is one if there are two antipodal points in \(C\) and zero otherwise [69].
- Simplex spherical code Spherical \((n,n+1,2+2/n)\) code whose codewords are all permutations of the \(n+1\)-dimensional vector \((1,1,\cdots,1,-n)\), up to normalization, forming an \(n\)-simplex. Codewords are all equidistant and their components add up to zero. Simplex spherical codewords in 2 (3, 4) dimensions form the vertices of a triangle (tetrahedron, 5-cell) In general, the code makes up the vertices of an \(n\)-simplex. See [60; Sec. 7.7] for a parameterization.
- Single parity-check (SPC) code a.k.a. Sum-zero code, Zero-sum code, Even-weight code.An \([n,n-1,2]\) linear binary code whose codewords consist of the message string appended with a parity-check bit or parity bit such that the parity (i.e., sum over all coordinates of each codeword) is zero. If the Hamming weight of a message is odd (even), then the parity bit is one (zero). This code requires only one extra bit of overhead and is therefore inexpensive. Its codewords are all even-weight binary strings. Its automorphism group is \(S_n\).
- Skew-cyclic code[399] A classical code \(C\) of length \(n\) over an alphabet \(R\) is skew-cyclic if there exists an automorphism, \(\theta\), of \(R\), such that for each string \(c_1 c_2 \cdots c_n\in C\), the skew-cyclically shifted string \(\theta(c_n) \theta(c_1) \cdots \theta(c_{n-1})\in C\). We say that \(C\) is a \(\theta\)-cyclic code over \(R\).
- Slepian group-orbit code[260,400,401] Spherical code in \(n\) dimensions whose codewords correspond to points in an orbit of some initial vector under a generating group \(G\), which is a subgroup of the orthogonal group \(O(n)\) of rotations in \(n\) dimensions, i.e., the automorphism group of spherical codes under the Euclidean distance. Neither the vector nor the group are unique for a given code.
- Sloane-Whitehead code[402] Member of an infinite \((n,\lambda\cdot 2^{n-m-1},3)\) nonlinear code family for any \(n\) satisfying \(2^m \leq n < 3.2^{m-1}\) for some \(m\) and for \(\lambda\in\{20/16,19/16,18/16\}\). Such a code has more codewords than any linear code with the same length and distance. The code is constructed by applying the \((u|u+v)\) construction recursively to the Julin-Golay codes.
- Small-distance block code A block code of length \(n\) that either detects or corrects errors on at most two coordinates, i.e., has distance \(d \leq 5\).
- Smith \(40\)-point code[403,404]
- Snub-cube code Spherical \((3,24,0.55384)\) code whose codewords are the vertices of the snub cube.
- Spacetime block code (STBC)[290,405–407] In a space-time block code, \(n\) spatially separated channels transmit symbols to \(m\) receiving channel using \(T\) time slots. These symbols can be arranged in a \(n \times T\) matrix where the rows correspond to the channels, and the columns correspond to the time slots. The codewords \(\{X\}\) making up the code are thus \(n \times T\) matrices.
- Spacetime code (STC)[408] Code designed for wireless transmission of information (via, e.g., radio waves) such that the sender can send multiple times from multiple locations. A spacetime code uses a modulation scheme to encode a message into signals that are sent at different times through different antennas, thereby utilizing both spatial and temporal (i.e., spacetime) degrees of freedom.
- Spatially coupled LDPC (SC-LDPC) code[246–248,409,410] LDPC code whose parity-check matrix is constructed by "spatially" coupling several copies of a regular LDPC parity-check matrix in chain-like fashion (or, more generally, in grid-like fashion) to yield a band matrix. A finite-length chain is then capped by imposing either open boundary conditions (yielding non-tail-biting SC-LDPC codes) or open boundary conditions (yielding tail-biting SC-LDPC codes); sometimes extra terminating vertices are added to the ends of the chain. Matrices corresponding to translationally invariant chains are called time-variant, and otherwise are called time-invariant. These codes can be constructed, e.g., using the lifting procedure or using edge-cutting vectors [411].
- Sphere packing An analog code whose points can be thought of as forming centers of (real or complex) spheres that pack (real or complex) space. Sphere packings provide ways of encoding digital or analog information into the frequency, amplitude, and phase of one or more analog waveforms for transmission through, e.g., an optical fiber or free space. This is due to Kotelnikov's [412] and Shannon's [413] fundamental observation that a discretized electromagnetic signal of finite bandwidth and average power \(P\) can be represented as a vector in \(\mathbb{R}^n\) with norm \(nP\). Questions of capacity of electromagnetic communication channels then translate to packing problems in \(\mathbb{R}^n\) [55].
- Spherical code Code whose codewords are points on an \(n\)-dimensional sphere \(S^{n}\) with radius one.
- Spherical design[414] Spherical code whose codewords are uniformly distributed in a way that is useful for determining averages of polynomials over the real sphere. A spherical code is a spherical design of strength \(t\), i.e., a \(t\)-design, if the average of any polynomial of degree up to \(t\) over its codewords is equal to the average over the entire sphere.
- Spherical sharp configuration[69,90,415,416] A spherical code that is a spherical design of strength \(2m-1\) for some \(m\) and that has \(m\) distances between distinct points. All known spherical sharp configrations are either obtained from the Leech or \(E_8\) lattice, certain regular polytopes, or are CGS isotropic subspace spherical codes [417; Table 1].
- Square-antiprism code Spherical \((3,8,4(4-\sqrt{2})/7)\) code whose codewords are the vertices of the square antiprism.
- Srivastava code[49,164] A special case of a generalized Srivastava code for \(z_j = \alpha_j^{\mu}\) for some \(\mu\) and \(t=1\).
- Star code[418] An MDS array code protecting against triple erasures.
- Subspace code[419] A code that is a set of subspaces of \(GF(q)^n\).
- Subspace design[420,421] a.k.a. \(q\)-design, Geometric design.A \(q\)-ary code that can be mapped into a subspace \(t\)-\((n,w,\lambda)_q\) design.
- Sum-rank-metric code[422] A code whose performance is evaluated in the sum-rank metric, which is a metric that generalizes both the Hamming metric and the rank metric.
- Superimposed code[423–426] A set of binary strings such that taking a bitwise OR (e.g., \(1+1=1\)) of a small set of codewords does not yield another codeword.
- Suzuki-curve code[427] Evaluation AG code of rational functions evaluated on points lying on a Suzuki curve.
- Ta-Shma zigzag code[428] Member of a family of \(\epsilon\)-balanced codes that nearly achieves the asymptotic GV bound. The codes have relative distance \(\frac{1}{2}-\frac{\epsilon}{2}\) and rate of order \(\Omega (\epsilon^{2+\beta})\) for \(\beta\to 0\) as \(n\to\infty\) [429].
- Tamo-Barg code[430] A family of \(q\)-ary polynomial evaluation codes that are optimal LRCs and for which \(q\) is comparable to \(n\).
- Tamo-Barg-Vladut code[431,432] Polynomial evaluation code on algebraic curves, such as Hermitian or Garcia-Stichtenoth curves, that is constructed to be an LRC. Codes can be constructed to be be able to recover locally after one or more erasures as well as to tackle the availability problem.
- Tanner code[385] a.k.a. Generalized LDPC (GLDPC) code.A linear \(q\)-ary code defined on a bipartite graph similar to a Tanner graph. This generalized Tanner graph consists of variable nodes and constraint nodes, with the generalization being that the constraint nodes of degree \(r\) now represent a linear codes of length \(r\).
- Tanner-Sridhara-Fuja (TSF) code[18] Array QC-LDPC code constructed from a cyclically shifted identity matrix; see [433; Exam. 21.6.5].
- Tensor-product code[85,434–436] a.k.a. Tensor code, Kroneckerian code, Product code.A matrix-based code constructed out of two linear binary or \(q\)-ary codes \(C_A,C_B\) in an outer-product construction denoted as \(C_A \otimes C_B\). Its dual is sometimes called the check-product code, denoted as \(C_{A}\boxplus C_{B}\).
- Ternary Golay code[170,437] A \([11,6,5]_3\) perfect ternary linear code with connections to various areas of mathematics, e.g., lattices [55] and sporadic simple groups [26]. Adding a parity bit to the code results in the self-dual \([12,6,6]_3\) extended ternary Golay code. Up to equivalence, both codes are unique for their respective parameters [171]. The dual of the ternary Golay code is a \([11,5,6]_3\) projective two-weight subcode.
- Tetracode[55] The \([4,2,3]_3\) self-dual MDS code that has connections to lattices [55].
- Tornado code[148,227,438] Linear binary code that is a precursor to fountain codes and whose encoding and decoding operations involve only XOR gates [439; Sec. 30.2].
- Torus-layer spherical code (TLSC)[440] Code whose codewords are elements of a foliation of the \(2n-1\)-dimensional hypersphere \(S^{2n-1}\) using flat tori \(S^1\times S^1\cdots\times S^1\). Related constructions include the spherical codes by Hopf foliations (SCHF) [441].
- Traceability code[442] An IPP code with which it is possible to detect a parent of a given pirated descendent by finding the closest codeword to that descendant.
- Tsfasman-Vladut-Zink (TVZ) code[443] Member of a family of residue AG or, more generally, evaluation AG codes where \(\cal X\) is either Drinfeld modular curve, a classic modular curve, or a Garcia-Stichtenoth curve.
- Turbo code[444,445] Code obtained from a parallel concatenation of two or more convolutional codes with permutations interleaving the individual encodings.
- Twisted BCH code[446–448] a.k.a. RS subspace subcode.Additive or linear \(q\)-ary code obtained from BCH codes via various lengthening and extension procedures such as Construction X and Construction XX.
- Two-weight code A linear \(q\)-ary code whose codewords all have one of two possible nonzero Hamming weights.
- Unary code a.k.a. Thermometer code.Trivial code that encodes integers \(1\) through \(n\) into binary strings of length \(n\). The \(i\)th codeword is a string consisting of \(i\) ones followed by \(n-i\) zeroes.
- Uniformly packed code[300,449,450] An \((n,K,2t+1)_q\) code is uniformly packed if its external distance is equal to \(t+1\) [26]; see [82; Def. 2.5] for the case of even distance and other generalizations.
- Unimodular lattice a.k.a. Self-dual lattice.A lattice that is equal to its dual, \(L^\perp = L\). Unimodular lattices have \(\det L = \pm 1\).
- Universally optimal \(q\)-ary code[90,398,451–455] A binary or \(q\)-ary code that (weakly) minimizes all completely monotonic potentials on binary space [455].
- Universally optimal code[456] A code that produces a minimum over all codes of its cardinality for a large family of potential functions. Such codes exist for the conventional \(q\)-ary and real spaces (see children below), but can also be formulated for more exotic spaces such as Lie groups, projective spaces, and real Grassmanians [457,458].
- Universally optimal sphere packing[69] A periodic sphere packing that (weakly) minimizes all completely monotonic potentials of square Euclidean distance among all periodic packings of the same density.
- Universally optimal spherical code[69,454,459–461] A spherical code that (weakly) minimizes all completely monotonic potentials on the sphere for its cardinality. See [463][462; Sec. 12.4] for further discussion.
- Varshamov-Tenengolts (VT) code[464,465] Nearly optimal binary deletion-correcting code and code for the asymmetric channel.
- Vasilyev code[466] Member of an infinite \((2^{m+1}-1,2^{2n-m},3)\) family of perfect nonlinear codes for any \(m \geq 3\). Constructed by applying a modification of the \((u|u+v)\) construction to a perfect \((2^m-1,2^{n-m},3)\) code, not necessarily linear [26; pg. 77].
- Weight-two code[467] A length-\(n\) binary code whose codewords all have Hamming weight two. Such codes provide slightly extra redundancy for storage of small-scale information such as ZIP codes or decimal digits.
- Weighted-covering code A \(q\)-ary code for which balls of some radius centered at its codewords provide a weighted covering of the Hamming space.
- Witting polytope code a.k.a. \(4_{21}\) real polytope code.Spherical \((8,240,1)\) code whose codewords are the vertices of the Witting complex polytope, the \(4_{21}\) real polytope, and the minimal lattice-shell code of the \(E_8\) lattice. The code is optimal and unique up to equivalence [55,468,469]. Antipodal pairs of points correspond to the 120 tritangent planes of a canonic sextic curve [69,202–204].
- Wozencraft ensemble code[470] A code that is part of the Wozencraft ensemble, a set of codes most of whose members achieve the GV bound.
- Wrapped spherical code[471] Spherical code in dimension \(n\) whose codewords are obtained from centers of spheres from a finite \(S^{n-1}\)-sphere packing of \(\mathbb{R}^{n}\) that is "wrapped" onto \(S^n\).
- X-code[472] An MDS array code with a simple geometrical construction that achieves optimal encoding and update complexity.
- Ye-Barg code[473,474] An MDS array code with the optimal access property; see Ref. [473] for definitions.
- Zetterberg code[475] Family of binary cyclic \([2^{2s}+1,2^{2s}-4s+1]\) codes with distance \(d>5\) generated by the minimal polynomial \(g_s(x)\) of \(\alpha\) over \(GF(2)\), where \(\alpha\) is a primitive \(n\)th root of unity in the field \(GF(2^{4s})\). They are quasi-perfect codes and are one of the best known families of double-error correcting binary linear codes
- Zigzag code[476] An MDS array code correcting against two erasures with optimal rebuilding ratio; see Ref. [476] for definitions.
- \((u|u+v)\)-construction code[402,477] Code constructed using a concatenation procedure that takes in two \(q\)-ary codes \(C_1,C_2\) and produces a new code whose codewords are \((u|u+v)\) for all \(u\in C_1\) and \(v\in C_2\). If the two codes have parameters \((n,K_1,d_1)\) and \((n,K_2,d_2)\), then the output code is a \((2n,K_1 K_2, \min\{2d_1,d_2\})\) code [32; Thm. 5.10][26; pg. 76].
- \(3_{21}\) polytope code[200] a.k.a. Hess polytope code, Hesse polytope code, 7-ic semi-regular figure code.Spherical \((7,56,1/3)\) code whose codewords are the vertices of the \(3_{21}\) real polytope (a.k.a. the Hess polytope). The vertices form the kissing configuration of the Witting polytope code. The code is optimal and unique up to equivalence [55,468,469]. Antipodal pairs of points correspond to the 28 bitangent lines of a general quartic plane curve [69,202–204].
- \(A_2\) triangular lattice a.k.a. \(A_2\) hexagonal lattice.Two-dimensional lattice that corresponds to the triangular tiling and that exhibits optimal packing, solving the packing, kissing, covering and quantization problems. As a tiling, its dual (whose points lie at the centers of each triangle) is the honeycomb tiling.
- \(A_n\) lattice Lattice-based \(n\)-dimensional code that can be simply defined in \(n+1\) dimensions as the set of integer vectors \(x\) lying in the hyperplane \(x_0+x_1+\cdots+x_{n} = 0\).
- \(A_n^{\perp}\) lattice Lattice-based \(n\)-dimensional code whose codewords form the dual of the \(A_n\) lattice.
- \(BW_{32}\) Barnes-Wall lattice[43] BW lattice in dimension \(32\).
- \(BW_{32}\) lattice-shell code Spherical code whose codewords are points on the \(BW_{32}\) Barnes-Wall lattice normalized to lie on the unit sphere.
- \(D_3\) face-centered cubic (fcc) lattice a.k.a. Cannonball lattice.Laminated three-dimensional lattice consisting of layers of triangular lattices.
- \(D_4\) hyper-diamond lattice BW lattice in dimension \(4\), which is the lattice corresponding to the \([4,1,4]\) repetition and \([4,3,2]\) SPC codes via Construction A.
- \(D_4\) lattice-shell code Spherical code whose codewords are points on the \(D_4\) lattice normalized to lie on the unit sphere.
- \(D_n\) checkerboard lattice Lattice consisting of all points whose coordinates add up to an even integer.
- \(ED_m\) code[478] a.k.a. Equidistant code with maximal distance.Member of the family of \( (c\frac{qt-1}{(t-1,q-1)},qt,ct\frac{q-1}{(t-1,q-1)}) \) \(q\)-ary codes, where \(c,t\geq 1\) and \((a,b)\) is the greatest common divisor of \(a\) and \(b\). Such codes are universally optimal and are related to resolvable block designs.
- \(E_6\) lattice-shell code Spherical code whose codewords are points on the \(E_6\) lattice normalized to lie on the unit sphere.
- \(E_6\) root lattice Lattice in dimension \(6\).
- \(E_7\) lattice-shell code Spherical code whose codewords are points on the \(E_7\) lattice normalized to lie on the unit sphere.
- \(E_7\) root lattice Lattice in dimension \(7\).
- \(E_8\) Gosset lattice[200] Unimodular even BW lattice in dimension \(8\), consisting of the Cayley integral octonions rescaled by \(\sqrt{2}\). The lattice corresponds to the \([8,4,4]\) Hamming code via Construction A.
- \(E_8\) Gosset lattice-shell code Spherical code whose codewords are points on the \(E_8\) Gosset lattice normalized to lie on the unit sphere.
- \(R\)-linear code A code of length \(n\) over a ring \(R\) is \(R\)-linear if it is a submodule of \(R^n\).
- \([2^m,m+1,2^{m-1}]\) First-order RM code a.k.a. Biorthogonal code, RM\((1,m)\) code, Augmented Hadamard code.A member of the family of first-order RM codes. Its codewords are the rows of the \(2^m\)-dimensional Hadamard matrix \(H\) and its negation \(-H\) with the mapping \(+1\to 0\) and \(-1\to 1\). They form a \((2^m,2^{m+1})\) biorthogonal spherical code under the antipodal mapping.
- \([2^m-1,m,2^{m-1}]\) simplex code[143,479] a.k.a. Shortened Hadamard code, RM\(^*(1,m)\) code, Maximum-length feedback-shift-register code.A member of the code family that is dual to the \([2^m,2^m-m-1,3]\) Hamming family. The columns of its generator matrix are in one-to-one correspondence with the elements of the projective space \(PG(m-1,2)\), with each column being a chosen representative of the corresponding element. The codewords form a \((2^m,2^m+1)\) simplex spherical code under the antipodal mapping.
- \([2^r,2^r-r-1,4]\) Extended Hamming code[143,170,480] Member of an infinite family of binary linear codes with parameters \([2^r,2^r-r-1, 4]\) for \(r \geq 2\) that are extensions of the Hamming codes by a parity-check bit.
- \([2^r-1,2^r-r-1,3]\) Hamming code[170,480] a.k.a. RM\(^*(r-2,r)\) code.Member of an infinite family of perfect linear codes with parameters \([2^r-1,2^r-r-1, 3]\) for \(r \geq 2\). Their \(r \times (2^r-1) \) parity-check matrix \(H\) has all possible non-zero \(r\)-bit strings as its columns. Adding a parity check yields the \([2^r,2^r-r-1, 4]\) extended Hamming code.
- \([48,24,12]\) self-dual code An extended quadratic-residue code that is known to be the only self-dual doubly even code at its parameters [481].
- \([56,6,36]_3\) Hill-cap code[482] Projective two-weight ternary code based on the Games graph [484][483; Table 19.1] and Hill's 56-cap [482]. Its automorphism group contains \(PSL_3(4)\) [485].
- \([7,3,4]\) simplex code a.k.a. RM\(^*(1,3)\) code, Little Hamming code.Second-smallest member of the simplex code family. The columns of its generator matrix are in one-to-one correspondence with the elements of the projective space \(PG(2,2)\), with each column being a chosen representative of the corresponding element. The codewords form a \((8,9)\) simplex spherical code under the antipodal mapping.
- \([7,4,3]\) Hamming code[143,170,480] Second-smallest member of the Hamming code family.
- \([78,6,56]_4\) Hill-cap code[486] Projective two-weight quaternary code based on a cap that corresponds to a strongly regular graph [484; Table 7.1].
- \([8,4,4]\) extended Hamming code[143,170,480] Extension of the \([7,4,3]\) Hamming code by a parity-check bit. The smallest doubly even self-dual code.
- \(\Lambda_{16}\) Barnes-Wall lattice[43] BW lattice in dimension \(16\).
- \(\Lambda_{16}\) lattice-shell code Spherical code whose codewords are points on the \(\Lambda_{16}\) Barnes-Wall lattice normalized to lie on the unit sphere.
- \(\Lambda_{24}\) Leech lattice[92] Even unimodular lattice in 24 dimensions that exhibits optimal packing. Its automorphism group is the Conway group \(.0\) a.k.a. Co\(_0\).
- \(\Lambda_{24}\) Leech lattice-shell code[92] Spherical code whose codewords are points on the \(\Lambda_{24}\) Leech lattice normalized to lie on the unit sphere. The minimal shell of the lattice yields the \((24,196560,1)\) code, and recursively taking their kissing configurations yields the \((23,4600,1/3)\) and \((22,891,1/4)\) spherical codes [414]; all codes are optimal and unique for their parameters [468,469].
- \(\mathbb{Z}^n\) hypercubic lattice Lattice-based code consisting of all integer vectors in \(n\) dimensions. Its generator matrix is the \(n\)-dimensional identity matrix. Its automorphism group consists of all coordinate permutations and sign changes.
- \(q\)-ary Hamming code[170,487] Member of an infinite family of perfect linear \(q\)-ary codes with parameters \([(q^r-1)/(q-1),(q^r-1)/(q-1)-r, 3]_q\) for \(r \geq 2\).
- \(q\)-ary LDGM code \(q\)-ary linear code with a sparse generator matrix. Alternatively, a member of an infinite family of \([n,k,d]_q\) codes for which the number of nonzero entries in each row and column of the generator matrix are both bounded by a constant as \(n\to\infty\).
- \(q\)-ary LDPC code[488] a.k.a. Non-binary LDPC (NBDPC) code.A \(q\)-ary linear code with a sparse parity-check matrix. Alternatively, a member of an infinite family of \([n,k,d]_q\) codes for which the number of nonzero entries in each row and column of the parity-check matrix are both bounded above by a constant as \(n\to\infty\).
- \(q\)-ary code Encodes \(K\) states (codewords) in \(n\) \(q\)-ary coordinates over the field \(GF(q)\), i.e., \(q\)-ary strings. Error-correcting performance is quantified by some distance \(d\), which in turn is defined using a metric. The default distance is the Hamming distance \(d\), the weight (i.e., number of nonzero coordinates) of the lowest-weight nonzero codeword; such codes are usually denoted as \((n,K,d)_q\). The corresponding Hamming metric between two \(q\)-ary strings is the number of coordinates in which they differ. Unless stated otherwise, the distance for this class is the Hamming distance.
- \(q\)-ary code over \(\mathbb{Z}_q\) A code encoding \(K\) states (codewords) in \(n\) coordinates over the ring \(\mathbb{Z}_q\) of integers modulo \(q\).
- \(q\)-ary duadic code[62,489–491] Member of a pair of cyclic linear binary codes that satisfy certain relations, depending on whether the pair is even-like or odd-like duadic. Duadic codes exist only when \(q\) is a square modulo \(n\) [62].
- \(q\)-ary linear LCC A linear code for which one can recover any coordinate of a codeword from at most \(r\) coordinates of the error word (assuming the error word is within some tolerated corruption rate \(\delta\)).
- \(q\)-ary linear LTC A \(q\)-ary linear code \(C\) of length \(n\) that is a \((u,R)\)-LTC with query complexity \(u\) and soundness \(R>0\). More technically, the code is a \((u,R)\)-LTC if the rows of its parity-check matrix \(H\in GF(q)^{r\times n}\) have weight at most \(u\) and if \begin{align} \frac{1}{r}|H x| \geq \frac{R}{n} D(x,C) \tag*{(10)}\end{align} holds for any \(q\)-ary string \(x\), where \(D(x,C)\) is the \(q\)-ary Hamming distance between \(x\) and the closest codeword to \(x\) [492; Def. 11]. A code satisfying the above constraint without the weight-\(u\) restriction is called an \(R\)-testable code [493].
- \(q\)-ary linear code over \(\mathbb{Z}_q\) A linear code encoding \(K\) states (codewords) in \(n\) coordinates over the ring \(\mathbb{Z}_q\) of integers modulo \(q\).
- \(q\)-ary parity-check code a.k.a. Sum-zero code, Zero-sum code.An \([n,n-1,2]_q\) linear \(q\)-ary code whose codewords consist of the message string appended with a parity-check or zero-sum check digit such that the sum over all coordinates of each codeword is zero.
- \(q\)-ary protograph LDPC code[494–497] A \(q\)-ary LDPC code whose parity-check matrix is constructed using the lifting procedure applied to the incidence matrix of a sparse graph called, in this context, a protograph. An ability to assign non-binary edge weight called edge scaling can also be used in code construction.
- \(q\)-ary quadratic-residue (QR) code
- \(q\)-ary repetition code An \([n,1,n]_q\) code encoding consisting of codewords \((j,j,\cdots,j)\) for \(j \in GF(q)\). The length \(n\) needs to be an odd number, since the receiver will pick the majority to recover the information.
- \(q\)-ary sharp configuration[90,398,455] A \(q\)-ary code that admits \(m\) different distances between distinct codewords and forms a design of strength \(2m-1\) or greater.
- \(q\)-ary simplex code[143,479] a.k.a. \(q\)-ary maximum-length feedback-shift-register code.An \([n,m,q^{m-1}]_q\) projective code with \(n=\frac{q^m-1}{q-1}\), denoted as \(S(q,m)\). The columns of the generator matrix are in one-to-one correspondence with the elements of the projective space \(PG(m-1,q)\), with each column being a chosen representative of the corresponding element.
- \(t\)-design a.k.a. Quadrature, Cubature, Averaging set.A code whose codewords are uniformly distributed in a way that is useful for determining averages of polynomials over the code's underlying space \(X\). In that way, the codewords form an approximation of the space. A code is a design on \(X\) of strength \(t\), i.e., a \(t\)-design on \(X\), if the average of any polynomial of degree up to \(t\) over its codewords is equal to the uniform average over all of \(X\).
- \(t\)-erasure LRC a.k.a. Multiple-erasure LRC.A code which admits local recoverability against more than one coordinate erasure.
References
- [1]
- L. Kollros, “An Attempt to determine the twenty-seven Lines upon a Surface of the third Order, and to divide such Surfaces into Species in Reference to the Reality of the Lines upon the Surface”, Gesammelte Mathematische Abhandlungen 198 (1953) DOI
- [2]
- M. Waegell and P. K. Aravind, “Parity Proofs of the Kochen–Specker Theorem Based on the 120-Cell”, Foundations of Physics 44, 1085 (2014) arXiv:1309.7530 DOI
- [3]
- H. S. M. Coxeter. Regular polytopes. Courier Corporation, 1973.
- [4]
- S. Mamone, G. Pileio, and M. H. Levitt, “Orientational Sampling Schemes Based on Four Dimensional Polytopes”, Symmetry 2, 1423 (2010) DOI
- [5]
- M. Waegell and P. K. Aravind, “Critical noncolorings of the 600-cell proving the Bell–Kochen–Specker theorem”, Journal of Physics A: Mathematical and Theoretical 43, 105304 (2010) arXiv:0911.2289 DOI
- [6]
- L. Rastanawi and G. Rote, “Towards a Geometric Understanding of the 4-Dimensional Point Groups”, (2022) arXiv:2205.04965
- [7]
- A. Abbasfar, D. Divsalar, and K. Yao, “Accumulate-Repeat-Accumulate Codes”, IEEE Transactions on Communications 55, 692 (2007) DOI
- [8]
- S. M. Alamouti, “A simple transmit diversity technique for wireless communications”, IEEE Journal on Selected Areas in Communications 16, 1451 (1998) DOI
- [9]
- G. A. Margulis, “Explicit constructions of graphs without short cycles and low density codes”, Combinatorica 2, 71 (1982) DOI
- [10]
- C. A. Kelley, D. Sridhara, and J. Rosenthal, “Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights”, IEEE Transactions on Information Theory 53, 1460 (2007) DOI
- [11]
- S. J. Johnson and S. R. Weller, “Regular low-density parity-check codes from combinatorial designs”, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494) DOI
- [12]
- S. J. Johnson and S. R. Weller, “Construction of low-density parity-check codes from Kirkman triple systems”, GLOBECOM’01. IEEE Global Telecommunications Conference (Cat. No.01CH37270) DOI
- [13]
- S. J. Johnson and S. R. Weller, “Resolvable 2-designs for regular low-density parity-check codes”, IEEE Transactions on Communications 51, 1413 (2003) DOI
- [14]
- B. Vasic and O. Milenkovic, “Combinatorial Constructions of Low-Density Parity-Check Codes for Iterative Decoding”, IEEE Transactions on Information Theory 50, 1156 (2004) DOI
- [15]
- S. J. Johnson and S. R. Weller, “Codes for iterative decoding from partial geometries”, Proceedings IEEE International Symposium on Information Theory, DOI
- [16]
- P. O. Vontobel and R. M. Tanner, “Construction of codes based on finite generalized quadrangles for iterative decoding”, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252) DOI
- [17]
- Z. Liu and D. A. Pados, “LDPC Codes From Generalized Polygons”, IEEE Transactions on Information Theory 51, 3890 (2005) DOI
- [18]
- Tanner, R. Michael, Deepak Sridhara, and Tom Fuja. "A class of group-structured LDPC codes." Proc. ISTA. 2001.
- [19]
- V. D. Goppa, “Codes Associated with Divisors”, Probl. Peredachi Inf., 13:1 (1977), 33–39; Problems Inform. Transmission, 13:1 (1977), 22–27
- [20]
- V. D. Goppa, “Codes on algebraic curves”, Dokl. Akad. Nauk SSSR, 259:6 (1981), 1289–1290
- [21]
- V. D. Goppa, “Algebraico-geometric codes”, Izv. Akad. Nauk SSSR Ser. Mat., 46:4 (1982), 762–781; Izv. Math., 21:1 (1983), 75–91
- [22]
- H. J. Helgert, “Noncyclic generalizations of BCH and srivastava codes”, Information and Control 21, 280 (1972) DOI
- [23]
- H. J. Helgert, “Alternant codes”, Information and Control 26, 369 (1974) DOI
- [24]
- H. J. Helgert, “Binary primitive alternant codes”, Information and Control 27, 101 (1975) DOI
- [25]
- P. Delsarte, “On subfield subcodes of modified Reed-Solomon codes (Corresp.)”, IEEE Transactions on Information Theory 21, 575 (1975) DOI
- [26]
- F. J. MacWilliams and N. J. A. Sloane. The theory of error correcting codes. Elsevier, 1977.
- [27]
- T. W. Melnyk, O. Knop, and W. R. Smith, “Extremal arrangements of points and unit charges on a sphere: equilibrium configurations revisited”, Canadian Journal of Chemistry 55, 1745 (1977) DOI
- [28]
- A. E. Gamal, L. Hemachandra, I. Shperling, and V. Wei, “Using simulated annealing to design good codes”, IEEE Transactions on Information Theory 33, 116 (1987) DOI
- [29]
- D. A. Kottwitz, “The densest packing of equal circles on a sphere”, Acta Crystallographica Section A Foundations of Crystallography 47, 158 (1991) DOI
- [30]
- P. G. Farrell, “Linear binary anticodes”, Electronics Letters 6, 419 (1970) DOI
- [31]
- P. G. Farrell and A. Farrag, “Further properties of linear binary anticodes”, Electronics Letters 10, 340 (1974) DOI
- [32]
- J. Bierbrauer, Introduction to Coding Theory (Chapman and Hall/CRC, 2016) DOI
- [33]
- I. N. Landjev, “Linear codes over finite fields and finite projective geometries”, Discrete Mathematics 213, 211 (2000) DOI
- [34]
- J. H. Conway and N. J. A. Sloane, “The antipode construction for sphere packings”, Inventiones Mathematicae 123, 309 (1996) DOI
- [35]
- Fan, John L. "Array codes as low-density parity-check codes." Proc. 2nd Int. Symp. on Turbo Codes & Related Topics, Brest, France, Sept. 2000.
- [36]
- J. L. Fan, “Array Codes as LDPC Codes”, Constrained Coding and Soft Iterative Decoding 195 (2001) DOI
- [37]
- T. Mittelholzer, “Efficient encoding and minimum distance bounds of Reed-Solomon-type array codes”, Proceedings IEEE International Symposium on Information Theory, DOI
- [38]
- A. Wang and Z. Zhang, “Repair Locality With Multiple Erasure Tolerance”, IEEE Transactions on Information Theory 60, 6979 (2014) arXiv:1306.4774 DOI
- [39]
- A. Wang and Z. Zhang, “Achieving Arbitrary Locality and Availability in Binary Codes”, (2015) arXiv:1501.04264
- [40]
- M. Blaum and R. M. Roth, “New array codes for multiple phased burst correction”, IEEE Transactions on Information Theory 39, 66 (1993) DOI
- [41]
- M. Blaum, P. G. Farrell, H. C. A. van Tilborg, 1998. Array codes. Handbook of coding theory, 2 (Part 2), pp. 1855-1909.
- [42]
- D. Knuth, “Efficient balanced codes”, IEEE Transactions on Information Theory 32, 51 (1986) DOI
- [43]
- E. S. Barnes and G. E. Wall, “Some extreme forms defined in terms of Abelian groups”, Journal of the Australian Mathematical Society 1, 47 (1959) DOI
- [44]
- M. Broué and M. Enguehard, “Une famille infinie de formes quadratiques entières; leurs groupes d’automorphismes”, Annales scientifiques de l’École normale supérieure 6, 17 (1973) DOI
- [45]
- Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, “Batch codes and their applications”, Proceedings of the thirty-sixth annual ACM symposium on Theory of computing (2004) DOI
- [46]
- E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan, “Robust pcps of proximity, shorter pcps and applications to coding”, Proceedings of the thirty-sixth annual ACM symposium on Theory of computing 1 (2004) DOI
- [47]
- E. Ben-Sasson and M. Sudan, “Simple PCPs with poly-log rate and query complexity”, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing 266 (2005) DOI
- [48]
- E. Ben-Sasson, M. Sudan, S. Vadhan, and A. Wigderson, “Randomness-efficient low degree tests and short PCPs via epsilon-biased sets”, Proceedings of the thirty-fifth annual ACM symposium on Theory of computing 612 (2003) DOI
- [49]
- E. R. Berlekamp, Algebraic Coding Theory (WORLD SCIENTIFIC, 2014) DOI
- [50]
- R. Roth, Introduction to Coding Theory (Cambridge University Press, 2006) DOI
- [51]
- Best, M.R. 1978. Binary codes with minimum distance four. Report ZW 112/78, Math Centrum, Amsterdam.
- [52]
- M. Best, “Binary codes with a minimum distance of four (Corresp.)”, IEEE Transactions on Information Theory 26, 738 (1980) DOI
- [53]
- S. Litsyn and A. Vardy, “The uniqueness of the Best code”, IEEE Transactions on Information Theory 40, 1693 (1994) DOI
- [54]
- J. Leech and N. J. A. Sloane, “Sphere Packings and Error-Correcting Codes”, Canadian Journal of Mathematics 23, 718 (1971) DOI
- [55]
- J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices and Groups (Springer New York, 1999) DOI
- [56]
- R. C. Bose and D. K. Ray-Chaudhuri, “On a class of error correcting binary group codes”, Information and Control 3, 68 (1960) DOI
- [57]
- R. C. Bose and D. K. Ray-Chaudhuri, “Further results on error correcting binary group codes”, Information and Control 3, 279 (1960) DOI
- [58]
- A. Hocquenghem, Codes correcteurs d'Erreurs, Chiffres (Paris), vol.2, pp.147-156, 1959.
- [59]
- C. E. Shannon, “A Mathematical Theory of Communication”, Bell System Technical Journal 27, 623 (1948) DOI
- [60]
- T. Ericson, and V. Zinoviev, eds. Codes on Euclidean spheres. Elsevier, 2001.
- [61]
- J. Leon, J. Masley, and V. Pless, “Duadic Codes”, IEEE Transactions on Information Theory 30, 709 (1984) DOI
- [62]
- V. Pless, “Duadic Codes and Generalizations”, Eurocode ’92 3 (1993) DOI
- [63]
- D. Slepian, “A Class of Binary Signaling Alphabets”, Bell System Technical Journal 35, 203 (1956) DOI
- [64]
- D. Slepian, “Some Further Theory of Group Codes”, Bell System Technical Journal 39, 1219 (1960) DOI
- [65]
- H. Hämäläinen and S. Rankinen, “Upper bounds for football pool problems and mixed covering codes”, Journal of Combinatorial Theory, Series A 56, 84 (1991) DOI
- [66]
- S. Myung, K. Yang, and J. Kim, “Quasi-Cyclic LDPC Codes for Fast Encoding”, IEEE Transactions on Information Theory 51, 2894 (2005) DOI
- [67]
- D. Gorenstein and N. Zierler, “A Class of Error-Correcting Codes in \(p^m \) Symbols”, Journal of the Society for Industrial and Applied Mathematics 9, 207 (1961) DOI
- [68]
- P. J. Cameron, J. M. Goethals, and J. J. Seidel, “Strongly regular graphs having strongly regular subconstituents”, Journal of Algebra 55, 257 (1978) DOI
- [69]
- H. Cohn and A. Kumar, “Universally optimal distribution of points on spheres”, Journal of the American Mathematical Society 20, 99 (2006) arXiv:math/0607446 DOI
- [70]
- A. Couvreur, “Codes and the Cartier Operator”, (2012) arXiv:1206.4728
- [71]
- R. Chien and D. Choy, “Algebraic generalization of BCH-Goppa-Helgert codes”, IEEE Transactions on Information Theory 21, 70 (1975) DOI
- [72]
- B. Yoshida, “Information storage capacity of discrete spin systems”, Annals of Physics 338, 134 (2013) arXiv:1111.3275 DOI
- [73]
- B. Yoshida, “Exotic topological order in fractal spin liquids”, Physical Review B 88, (2013) arXiv:1302.6248 DOI
- [74]
- H. Bombin and M. A. Martin-Delgado, “Homological error correction: Classical and quantum codes”, Journal of Mathematical Physics 48, (2007) arXiv:quant-ph/0605094 DOI
- [75]
- M.-S. Vaezi, G. Ortiz, and Z. Nussinov, “Robust topological degeneracy of classical theories”, Physical Review B 93, (2016) arXiv:1511.07867 DOI
- [76]
- D. Chandra, Z. Babar, H. V. Nguyen, D. Alanis, P. Botsinis, S. X. Ng, and L. Hanzo, “Quantum Topological Error Correction Codes: The Classical-to-Quantum Isomorphism Perspective”, IEEE Access 6, 13729 (2018) DOI
- [77]
- H. Chadwick and L. Kurz, “Rank permutation group codes based on Kendall’s correlation statistic”, IEEE Transactions on Information Theory 15, 306 (1969) DOI
- [78]
- I. F. Blake, G. Cohen, and M. Deza, “Coding with permutations”, Information and Control 43, 1 (1979) DOI
- [79]
- V. Ramkumar, M. Vajha, S. B. Balaji, M. Nikhil Krishnan, B. Sasidharan, P. Vijay Kumar, "Codes for Distributed Storage." Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021) DOI
- [80]
- I. M. Duursma, C. Rentería, and H. Tapia-Recillas, “Reed-Muller Codes on Complete Intersections”, Applicable Algebra in Engineering, Communication and Computing 11, 455 (2001) DOI
- [81]
- Delsarte, Philippe. "An algebraic approach to the association schemes of coding theory." Philips Res. Rep. Suppl. 10 (1973)
- [82]
- J. Borges, J. Rifà, and V. A. Zinoviev, “On Completely Regular Codes”, (2017) arXiv:1703.08684
- [83]
- M. Shi, D. Lu, A. Armario, R. Egan, F. Ozbudak, and P. Solé, “Butson Hadamard matrices, bent sequences, and spherical codes”, (2023) arXiv:2311.00354
- [84]
- R. Egan, “A survey of complex generalized weighing matrices and a construction of quantum error-correcting codes”, (2023) arXiv:2309.07522
- [85]
- G. D. Forney, Jr (1966). Concatenated Codes. MIT Press, Cambridge, MA.
- [86]
- N. J. A. Sloane and J. J. Seidel, “A NEW FAMILY OF NONLINEAR CODES OBTAINED FROM CONFERENCE MATRICES”, Annals of the New York Academy of Sciences 175, 363 (1970) DOI
- [87]
- Delsarte, Philippe. "An algebraic approach to the association schemes of coding theory." Philips Res. Rep. Suppl. 10 (1973): vi+-97.
- [88]
- P. Delsarte, “Association schemes and t-designs in regular semilattices”, Journal of Combinatorial Theory, Series A 20, 230 (1976) DOI
- [89]
- Ph. Delsarte, “Hahn Polynomials, Discrete Harmonics, andt-Designs”, SIAM Journal on Applied Mathematics 34, 157 (1978) DOI
- [90]
- V. I. Levenshtein, “Designs as maximum codes in polynomial metric spaces”, Acta Applicandae Mathematicae 29, 1 (1992) DOI
- [91]
- S. D. Constantin and T. R. N. Rao, “On the theory of binary asymmetric error correcting codes”, Information and Control 40, 20 (1979) DOI
- [92]
- J. Leech, “Notes on Sphere Packings”, Canadian Journal of Mathematics 19, 251 (1967) DOI
- [93]
- Peter Elias. Coding for noisy channels. IRE Convention Records, 3(4):37–46, 1955.
- [94]
- H. S. M. Coxeter and J. A. Todd, “An Extreme Duodenary Form”, Canadian Journal of Mathematics 5, 384 (1953) DOI
- [95]
- H. H. Mitchell, “Determination of All Primitive Collineation Groups in More than Four Variables which Contain Homologies”, American Journal of Mathematics 36, 1 (1914) DOI
- [96]
- J. H. Conway and N. J. A. Sloane, “The Coxeter–Todd lattice, the Mitchell group, and related sphere packings”, Mathematical Proceedings of the Cambridge Philosophical Society 93, 421 (1983) DOI
- [97]
- Vries, L.B. and Odaka, K., 1982, June. CIRC-the error-correcting code for the compact disc digital audio system. In Audio Engineering Society Conference: 1st International Conference: Digital Audio. Audio Engineering Society.
- [98]
- Odaka K., Sako Y., Iwamoto I., Doi T.; Vries L.B.; SONY: Error correctable data transmission method (Patent US4413340) filing date May 21, 1980.
- [99]
- S. Hakimi and J. Bredeson, “Graph theoretic error-correcting codes”, IEEE Transactions on Information Theory 14, 584 (1968) DOI
- [100]
- Kasami, T. "A topological approach to construction of group codes." J. Inst. Elec. Commun. Engrs.(Japan) 44 (1961): 1316-1321.
- [101]
- Huffman, D. A. "A graph-theoretic formulation of binary group codes." Summaries of papers presented at ICMCI, part 3 (1964): 29-30.
- [102]
- Frazer, W. D. "A graph theoretic approach to linear codes." Proc. Second Annual Allerton Conf. On Circuit & System Theory. 1964.
- [103]
- S. Hakimi and H. Frank, “Cut-set matrices and linear codes (Corresp.)”, IEEE Transactions on Information Theory 11, 457 (1965) DOI
- [104]
- E. Prange, Cyclic Error-Correcting Codes in Two Symbols, TN-57-/03, (September 1957)
- [105]
- E. Prange, Some cyclic error-correcting codes with simple decoding algorithms, TN-58-156, (April 1958)
- [106]
- E. Prange, The use of coset equivalence in the analysis and decoding of group codes, TN-59-/64, (1959)
- [107]
- E. Prange, An algorithm for factoring xn - I over a finite field. TN-59-/75, (October 1959)
- [108]
- W. W. Peterson and E. J. Weldon, Error-correcting codes. MIT press 1972.
- [109]
- W. Peterson and D. Brown, “Cyclic Codes for Error Detection”, Proceedings of the IRE 49, 228 (1961) DOI
- [110]
- S. Lin and D. J. Costello, Error Control Coding, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 2004.
- [111]
- H. M. Kiah, G. J. Puleo, and O. Milenkovic, “Codes for DNA Storage Channels”, (2015) arXiv:1410.8837
- [112]
- S. H. Hansen, “Error-Correcting Codes from Higher-Dimensional Varieties”, Finite Fields and Their Applications 7, 530 (2001) DOI
- [113]
- S.H. Hansen, The geometry of Deligne-Lusztig varieties: Higher dimensional AG codes, Ph.D. Thesis, University of Aarhus, 1999.
- [114]
- S. H. Hansen, “Canonical bundles of Deligne-Lusztig varieties”, manuscripta mathematica 98, 363 (1999) DOI
- [115]
- J. P. Hansen, “Deligne-Lusztig varieties and group codes”, Lecture Notes in Mathematics 63 (1992) DOI
- [116]
- P. Delsarte and J. M. Goethals, “Alternating bilinear forms over GF(q)”, Journal of Combinatorial Theory, Series A 19, 26 (1975) DOI
- [117]
- R. H. F. Denniston, “Some maximal arcs in finite projective planes”, Journal of Combinatorial Theory 6, 317 (1969) DOI
- [118]
- M. Elyasi and S. Mohajer, “Determinant Coding: A Novel Framework for Exact-Repair Regenerating Codes”, IEEE Transactions on Information Theory 62, 6683 (2016) DOI
- [119]
- M. Ye and A. Barg, “Explicit constructions of MDS array codes and RS codes with optimal repair bandwidth”, 2016 IEEE International Symposium on Information Theory (ISIT) (2016) DOI
- [120]
- E. J. Weldon Jr., “Difference-Set Cyclic Codes”, Bell System Technical Journal 45, 1045 (1966) DOI
- [121]
- D. J. C. MacKay and M. C. Davey, “Evaluation of Gallager Codes for Short Block Length and High Rate Applications”, Codes, Systems, and Graphical Models 113 (2001) DOI
- [122]
- I. Dinur, “The PCP theorem by gap amplification”, Journal of the ACM 54, 12 (2007) DOI
- [123]
- E. Ben-Sasson and M. Sudan, “Robust Locally Testable Codes and Products of Codes”, (2004) arXiv:cs/0408066
- [124]
- H. N. Ward, “Divisible codes”, Archiv der Mathematik 36, 485 (1981) DOI
- [125]
- S. Kurz, “Divisible Codes”, (2023) arXiv:2112.11763
- [126]
- A. R. Calderbank, E. M. Rains, P. W. Shor, and N. J. A. Sloane, “Quantum Error Correction via Codes over GF(4)”, (1997) arXiv:quant-ph/9608006
- [127]
- Self-Dual Codes and Invariant Theory (Springer-Verlag, 2006) DOI
- [128]
- W. C. Huffman and V. Pless, Fundamentals of Error-Correcting Codes (Cambridge University Press, 2003) DOI
- [129]
- M. Blaum, J. Brady, J. Bruck, and Jai Menon, “EVENODD: an efficient scheme for tolerating double disk failures in RAID architectures”, IEEE Transactions on Computers 44, 192 (1995) DOI
- [130]
- Levenshtein, Vladimir I. "Binary codes capable of correcting deletions, insertions, and reversals." Soviet physics doklady. Vol. 10. No. 8. 1966.
- [131]
- T. G. Dietterich and G. Bakiri, “Solving Multiclass Learning Problems via Error-Correcting Output Codes”, (1995) arXiv:cs/9501101
- [132]
- Allwein, Erin L., Robert E. Schapire, and Yoram Singer. "Reducing multiclass to binary: A unifying approach for margin classifiers." Journal of machine learning research 1.Dec (2000): 113-141.
- [133]
- T. Høholdt, J.H. Van Lint, and R. Pellikaan, 1998. Algebraic geometry codes. Handbook of coding theory, 1 (Part 1), pp.871-961.
- [134]
- M. Tsfasman, S. Vlǎduţ, and D. Nogin. Algebraic geometric codes: basic notions. Vol. 139. American Mathematical Society, 2022.
- [135]
- M. A. Tsfasman and S. G. Vlăduţ, Algebraic-Geometric Codes (Springer Netherlands, 1991) DOI
- [136]
- M. Sipser and D. A. Spielman, “Expander codes”, IEEE Transactions on Information Theory 42, 1710 (1996) DOI
- [137]
- S. Hoory, N. Linial, and A. Wigderson, “Expander graphs and their applications”, Bulletin of the American Mathematical Society 43, 439 (2006) DOI
- [138]
- A. Lubotzky, R. Phillips, and P. Sarnak, “Ramanujan graphs”, Combinatorica 8, 261 (1988) DOI
- [139]
- G. Davidoff, P. Sarnak, and A. Valette, Elementary Number Theory, Group Theory and Ramanujan Graphs (Cambridge University Press, 2001) DOI
- [140]
- M. Yang, Y. Li, andW.E. Ryan, Design of efficiently-encodable moderate-length high-rate irregular LDPC codes, Proc. 40th Annual Allerton Conference on Communication, Control, and Computing, Champaign, IL., pp. 1415–1424, October 2002.
- [141]
- M. Yang and W. E. Ryan, “Lowering the error-rate floors of moderate-length high-rate irregular ldpc codes”, IEEE International Symposium on Information Theory, 2003. Proceedings. (2003) DOI
- [142]
- M. Yang, W. E. Ryan, and Y. Li, “Design of Efficiently Encodable Moderate-Length High-Rate Irregular LDPC Codes”, IEEE Transactions on Communications 52, 564 (2004) DOI
- [143]
- C. E. Shannon, “A Mathematical Theory of Communication”, Bell System Technical Journal 27, 379 (1948) DOI
- [144]
- Y. Kou, S. Lin, and M. P. C. Fossorier, “Low-density parity-check codes based on finite geometries: a rediscovery and new results”, IEEE Transactions on Information Theory 47, 2711 (2001) DOI
- [145]
- Heng Tang, Jun Xu, S. Lin, and K. A. S. Abdel-Ghaffar, “Codes on finite geometries”, IEEE Transactions on Information Theory 51, 572 (2005) DOI
- [146]
- F. Rodier, “Codes from flag varieties over a finite field”, Journal of Pure and Applied Algebra 178, 203 (2003) DOI
- [147]
- V. Y. Krachkovsky, “Reed-solomon codes for correcting phased error bursts”, IEEE Transactions on Information Theory 49, 2975 (2003) DOI
- [148]
- J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege, “A digital fountain approach to reliable distribution of bulk data”, ACM SIGCOMM Computer Communication Review 28, 56 (1998) DOI
- [149]
- D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data”, IEEE Transactions on Information Theory 44, 1897 (1998) DOI
- [150]
- D. R. Stinson, T. van Trung, and R. Wei, “Secure frameproof codes, key distribution patterns, group testing algorithms and related structures”, Journal of Statistical Planning and Inference 86, 595 (2000) DOI
- [151]
- D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data”, Advances in Cryptology — CRYPT0’ 95 452 (1995) DOI
- [152]
- E. M. Gabidulin, Theory of Codes with Maximum Rank Distance, Problemy Peredachi Informacii, Volume 21, Issue 1, 3–16 (1985)
- [153]
- P. Delsarte, “Bilinear forms over a finite field, with applications to coding theory”, Journal of Combinatorial Theory, Series A 25, 226 (1978) DOI
- [154]
- R. M. Roth, “Maximum-rank array codes and their application to crisscross error correction”, IEEE Transactions on Information Theory 37, 328 (1991) DOI
- [155]
- R. Gallager, “Low-density parity-check codes”, IEEE Transactions on Information Theory 8, 21 (1962) DOI
- [156]
- R. Gallager, Low-density parity check codes. 1963. PhD thesis, MIT Cambridge, MA.
- [157]
- A. Rajput, A. Roggero, and N. Wiebe, “Quantum Error Correction with Gauge Symmetries”, (2022) arXiv:2112.05186
- [158]
- L. Spagnoli, A. Roggero, and N. Wiebe, “Fault-tolerant simulation of Lattice Gauge Theories with gauge covariant codes”, (2024) arXiv:2405.19293
- [159]
- M. Blaum, J. Bruck, and A. Vardy, “MDS array codes with independent parity symbols”, IEEE Transactions on Information Theory 42, 529 (1996) DOI
- [160]
- J. Boutros, O. Pothier, and G. Zemor, “Generalized low density (Tanner) codes”, 1999 IEEE International Conference on Communications (Cat. No. 99CH36311) DOI
- [161]
- T. Kasami, Shu Lin, and W. Peterson, “New generalizations of the Reed-Muller codes--I: Primitive codes”, IEEE Transactions on Information Theory 14, 189 (1968) DOI
- [162]
- E. Weldon, “New generalizations of the Reed-Muller codes--II: Nonprimitive codes”, IEEE Transactions on Information Theory 14, 199 (1968) DOI
- [163]
- P. Delsarte, J. M. Goethals, and F. J. Mac Williams, “On generalized ReedMuller codes and their relatives”, Information and Control 16, 403 (1970) DOI
- [164]
- H. Helgert, “Srivastava codes”, IEEE Transactions on Information Theory 18, 292 (1972) DOI
- [165]
- È. L. Blokh, V. V. Zyablov, “Coding of Generalized Concatenated Codes”, Probl. Peredachi Inf., 10:3 (1974), 45–50; Problems Inform. Transmission, 10:3 (1974), 218–222
- [166]
- V. A. Zinoviev, “Generalized Cascade Codes”, Probl. Peredachi Inf., 12:1 (1976), 5–15; Problems Inform. Transmission, 12:1 (1976), 2–9
- [167]
- V. A. Zinoviev, “Generalized Cascade Codes”, Probl. Peredachi Inf., 12:1 (1976)
- [168]
- D. G. Glynn, “The non-classical 10-arc of PG(4, 9)”, Discrete Mathematics 59, 43 (1986) DOI
- [169]
- J. M. Goethals, “Two dual families of nonlinear binary codes”, Electronics Letters 10, 471 (1974) DOI
- [170]
- M. J. E. Golay, Notes on digital coding, Proc. IEEE, 37 (1949) 657.
- [171]
- P. Delsarte and J. M. Goethals, “Unrestricted codes with the golay parameters are unique”, Discrete Mathematics 12, 211 (1975) DOI
- [172]
- J. H. Conway and N. J. A. Sloane, “Orbit and coset analysis of the Golay and related codes”, IEEE Transactions on Information Theory 36, 1038 (1990) DOI
- [173]
- W. Feit. Some remarks on weight functions of spaces over GF(2), unpublished (1972)
- [174]
- C. L. Mallows and N. J. A. Sloane, “Weight enumerators of self-orthogonal codes”, Discrete Mathematics 9, 391 (1974) DOI
- [175]
- R. Gold, “Optimal binary sequences for spread spectrum multiplexing (Corresp.)”, IEEE Transactions on Information Theory 13, 619 (1967) DOI
- [176]
- O. Goldreich and M. Sudan, “Locally testable codes and PCPs of almost-linear length”, Journal of the ACM 53, 558 (2006) DOI
- [177]
- V. D. Goppa, "A new class of linear error-correcting codes", Probl. Peredach. Inform., vol. 6, no. 3, pp. 24-30, Sept. 1970.
- [178]
- V. D. Goppa, "Rational representation of codes and (Lg) codes", Probl. Peredach. Inform., vol. 7, no. 3, pp. 41-49, Sept. 1971.
- [179]
- E. Berlekamp, “Goppa codes”, IEEE Transactions on Information Theory 19, 590 (1973) DOI
- [180]
- V. D. Tonchev, “Binary codes derived from the Hoffman-Singleton and Higman-Sims graphs”, IEEE Transactions on Information Theory 43, 1021 (1997) DOI
- [181]
- V. D. Tonchev, “Error-correcting codes from graphs”, Discrete Mathematics 257, 549 (2002) DOI
- [182]
- C. T. Ryan, An application of Grassmannian varieties to coding theory. Congr. Numer. 57 (1987) 257–271.
- [183]
- C.T. Ryan, Projective codes based on Grassmann varieties, Congr. Numer. 57, 273–279 (1987).
- [184]
- C. T. Ryan and K. M. Ryan, “The minimum weight of the Grassmann codes C(k,n),”, Discrete Applied Mathematics 28, 149 (1990) DOI
- [185]
- D. Yu. Nogin, “Codes associated to Grassmannians”, Arithmetic, Geometry, and Coding Theory DOI
- [186]
- Gray, Frank. "Pulse code communication." United States Patent Number 2632058 (1953).
- [187]
- E. N. Gilbert, “Gray Codes and Paths on the n-Cube”, Bell System Technical Journal 37, 815 (1958) DOI
- [188]
- J. T. Joichi, D. E. White, and S. G. Williamson, “Combinatorial Gray Codes”, SIAM Journal on Computing 9, 130 (1980) DOI
- [189]
- J. H. Griesmer, “A Bound for Error-Correcting Codes”, IBM Journal of Research and Development 4, 532 (1960) DOI
- [190]
- G. Solomon and J. J. Stiffler, “Algebraically punctured cyclic codes”, Information and Control 8, 170 (1965) DOI
- [191]
- R. R. Varshamov, On the general theory of linear coding, Ph.D. Thesis, Moscow State University, 1959.
- [192]
- S. D. Berman, “On the theory of group codes”, Cybernetics 3, 25 (1969) DOI
- [193]
- A. Günther and G. Nebe, “Automorphisms of doubly even self-dual binary codes”, Bulletin of the London Mathematical Society 41, 769 (2009) arXiv:0810.3787 DOI
- [194]
- Günther, Annika. Automorphism groups of self-dual codes. Diss. Aachen, Techn. Hochsch., Diss., 2009, 2009.
- [195]
- J. P. Hansen, “Toric Surfaces and Error-correcting Codes”, Coding Theory, Cryptography and Related Areas 132 (2000) DOI
- [196]
- D. Joyner, “Toric codes over finite fields”, (2003) arXiv:math/0208155
- [197]
- H. Tiersma, “Remarks on codes from Hermitian curves (Corresp.)”, IEEE Transactions on Information Theory 33, 605 (1987) DOI
- [198]
- R. E. Blahut, Algebraic Codes on Lines, Planes, and Curves (Cambridge University Press, 2001) DOI
- [199]
- I. M. Chakravarti, “Families of Codes with Few Distinct Weights from Singular and Non-Singular Hermitian Varieties and Quadrics in Projective Geometries and Hadamard Difference Sets and Designs Associated with Two-Weight Codes”, The IMA Volumes in Mathematics and Its Applications 35 (1990) DOI
- [200]
- Gosset, Thorold. "On the regular and semi-regular figures in space of n dimensions." Messenger of Mathematics 29 (1900): 43-48.
- [201]
- Schoute, P. H. "On the relation between the vertices of a definite six-dimensional polytope and the lines of a cubic surface." Proc. Roy. Acad. Amsterdam. Vol. 13. 1910.
- [202]
- P. du Val, “On the Directrices of a Set of Points in a Plane”, Proceedings of the London Mathematical Society s2-35, 23 (1933) DOI
- [203]
- Arnold, V. I. (1999). Symplectization, complexification and mathematical trinities. The Arnoldfest, 23-37.
- [204]
- Y.-H. He and J. McKay, “Sporadic and Exceptional”, (2015) arXiv:1505.06742
- [205]
- K. A. Bush, “Orthogonal Arrays of Index Unity”, The Annals of Mathematical Statistics 23, 426 (1952) DOI
- [206]
- J. A. Harvey and G. W. Moore, “Moonshine, superconformal symmetry, and quantum error correction”, Journal of High Energy Physics 2020, (2020) arXiv:2003.13700 DOI
- [207]
- G. Hoehn, “Self-dual Codes over the Kleinian Four Group”, (2000) arXiv:math/0005266
- [208]
- Hill, R. (1973). Caps and groups. Colloquio Internazionale sulle Teorie Combinatorie (Rome, 1973), 2, 389-394.
- [209]
- J. W. P. Hirschfeld. Rational curves on quadrics over finite fields of characteristic two. Rend. Mat. (6), 4:773–795, 1971.
- [210]
- S. Ball, Finite Geometry and Combinatorial Applications (Cambridge University Press, 2015) DOI
- [211]
- A. J. Hoffman and R. R. Singleton, “On Moore Graphs with Diameters 2 and 3”, IBM Journal of Research and Development 4, 497 (1960) DOI
- [212]
- C.-H. Hsu and A. Anastasopoulos, “Capacity-Achieving Codes with Bounded Graphical Complexity on Noisy Channels”, (2005) arXiv:cs/0509062
- [213]
- K. Saints and C. Heegard, “On hyperbolic cascaded Reed-Solomon codes”, Lecture Notes in Computer Science 291 (1993) DOI
- [214]
- Gui-Liang Feng and T. R. N. Rao, “Improved geometric Goppa codes. I. Basic theory”, IEEE Transactions on Information Theory 41, 1678 (1995) DOI
- [215]
- O. Geil and T. Høholdt, “On Hyperbolic Codes”, Lecture Notes in Computer Science 159 (2001) DOI
- [216]
- E. B. Da Silva, R. Palazzo, and S. R. Costa, “Improving the performance of asymmetric M-PAM signal constellations in Euclidean space by embedding them in hyperbolic space”, 1998 Information Theory Workshop (Cat. No.98EX131) DOI
- [217]
- E. B. da Silva, M. Firer, S. R. Costa, and R. Palazzo Jr., “Signal constellations in the hyperbolic plane: A proposal for new communication systems”, Journal of the Franklin Institute 343, 69 (2006) DOI
- [218]
- R. C. Bose (1947). Mathematical theory of the symmetrical factorial design. Sankhyā: The Indian Journal of Statistics, 107-166.
- [219]
- H. D. L. Hollmann, J. H. van Lint, J.-P. Linnartz, and L. M. G. M. Tolhuizen, “On Codes with the Identifiable Parent Property”, Journal of Combinatorial Theory, Series A 82, 121 (1998) DOI
- [220]
- E. Prange, The use of coset equivalene in the analysis and decoding of group codes. AIR FORCE CAMBRIDGE RESEARCH LABS HANSCOM AFB MA, 1959.
- [221]
- L. Rudolph, “A class of majority logic decodable codes (Corresp.)”, IEEE Transactions on Information Theory 13, 305 (1967) DOI
- [222]
- E. Prange, "Some cyclic error-correcting codes with simple decoding algorithms." AFCRC-TN-58-156 (1985).
- [223]
- B. Bagchi and S. P. Inamdar, “Projective Geometric Codes”, Journal of Combinatorial Theory, Series A 99, 128 (2002) DOI
- [224]
- M. Lavrauw, L. Storme, and G. Van de Voorde (2010). Linear codes from projective spaces. In A. Bruen & D. Wehlau (Eds.), Contemporary Mathematics (Vol. 523, pp. 185–202). Providence, RI, USA: American Mathematical Society (AMS).
- [225]
- L. Storme, "Coding Theory and Galois Geometries." Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021) DOI
- [226]
- M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman, “Improved low-density parity-check codes using irregular graphs”, IEEE Transactions on Information Theory 47, 585 (2001) DOI
- [227]
- M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Spielman, and V. Stemann, “Practical loss-resilient codes”, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing - STOC ’97 150 (1997) DOI
- [228]
- Hui Jin, Aamod Khandekar, and Robert McEliece. "Irregular repeat-accumulate codes." Proc. 2nd Int. Symp. Turbo codes and related topics. 2000.
- [229]
- A. D. Khandekar, Graph-Based Codes and Iterative Decoding, California Institute of Technology, 2003 DOI
- [230]
- Hui Jin, Aamod Khandekar, and Robert J. McEliece. "Serial concatenation of interleaved convolutional codes forming turbo-like codes." United States Patent Number 7116710B1 (2023).
- [231]
- M. Golay, “Binary coding”, Transactions of the IRE Professional Group on Information Theory 4, 23 (1954) DOI
- [232]
- D. Julin, “Two improved block codes (Corresp.)”, IEEE Transactions on Information Theory 11, 459 (1965) DOI
- [233]
- J. A. Barrau, On the combinatory problem of Steiner, Proc. Section of Sciences, Koninklijke Akademie van Wetenschappen te Amsterdam 11 (1908), 352–360.
- [234]
- J. Leech, “Some Sphere Packings in Higher Space”, Canadian Journal of Mathematics 16, 657 (1964) DOI
- [235]
- J. H. Conway and N. J. A. Sloane, “Quaternary constructions for the binary single-error-correcting codes of Julin, Best and others”, Designs, Codes and Cryptography 4, 31 (1994) DOI
- [236]
- J. Justesen, “Class of constructive asymptotically good algebraic codes”, IEEE Transactions on Information Theory 18, 652 (1972) DOI
- [237]
- Kasami, Tadao. Weight distribution formula for some class of cyclic codes. Champaign, IL, USA: University of Illinois, 1966.
- [238]
- A. M. Kerdock, “A class of low-rate nonlinear binary codes”, Information and Control 20, 182 (1972) DOI
- [239]
- König, Hermann. "Isometric imbeddings of Euclidean spaces into finite dimensional lp-spaces." Banach Center Publications 34.1 (1995): 79-87. <https://eudml.org/doc/251336>.
- [240]
- P. J. CAMERON and J. J. SEIDEL, “QUADRATIC FORMS OVER GF(2)”, Geometry and Combinatorics 290 (1991) DOI
- [241]
- Levenshtein, V. I. "Bounds on the maximal cardinality of a code with bounded modulus of the inner product." Soviet Math. Dokl. Vol. 25. No. 2. 1982.
- [242]
- H. Cohn, D. de Laat, and N. Leijenhorst, “Optimality of spherical codes via exact semidefinite programming bounds”, (2024) arXiv:2403.16874
- [243]
- J. Hansen, “Codes on the Klein quartic, ideals, and decoding (Corresp.)”, IEEE Transactions on Information Theory 33, 923 (1987) DOI
- [244]
- S. Kopparty, O. Meir, N. Ron-Zewi, and S. Saraf, “High-Rate Locally Correctable and Locally Testable Codes with Sub-Polynomial Query Complexity”, Journal of the ACM 64, 1 (2017) DOI
- [245]
- S. Gopi, S. Kopparty, R. Oliveira, N. Ron-Zewi, and S. Saraf, “Locally Testable and Locally Correctable Codes approaching the Gilbert-Varshamov Bound”, IEEE Transactions on Information Theory 64, 5813 (2018) DOI
- [246]
- A. Jimenez Felstrom and K. S. Zigangirov, “Time-varying periodic convolutional codes with low-density parity-check matrix”, IEEE Transactions on Information Theory 45, 2181 (1999) DOI
- [247]
- K. Engdahl, K. Sh. Zigangirov, “To the Theory of Low-Density Convolutional Codes. I”, Probl. Peredachi Inf., 35:4 (1999), 12–28; Problems Inform. Transmission, 35:4 (1999), 295–310
- [248]
- M. Lentmaier, D. V. Truhachev, and K. Sh. Zigangirov, Problems of Information Transmission 37, 288 (2001) DOI
- [249]
- J. Hamkins and K. Zeger, “Asymptotically dense spherical codes .II. laminated spherical codes”, IEEE Transactions on Information Theory 43, 1786 (1997) DOI
- [250]
- N. Sloane, “Tables of sphere packings and spherical codes”, IEEE Transactions on Information Theory 27, 327 (1981) DOI
- [251]
- A. K. Khandani and P. Kabal, “Shaping multidimensional signal spaces. I. Optimum shaping, shell mapping”, IEEE Transactions on Information Theory 39, 1799 (1993) DOI
- [252]
- F. Lazebnik and V. A. Ustimenko, “Explicit construction of graphs with an arbitrary large girth and of large size”, Discrete Applied Mathematics 60, 275 (1995) DOI
- [253]
- J.-L. Kim, U. N. Peled, I. Perepelitsa, V. Pless, and S. Friedland, “Explicit Construction of Families of LDPC Codes With No&lt;tex&gt;\(4\)&lt;/tex&gt;-Cycles”, IEEE Transactions on Information Theory 50, 2378 (2004) DOI
- [254]
- I. Dinur, S. Evra, R. Livne, A. Lubotzky, and S. Mozes, “Locally Testable Codes with constant rate, distance, and locality”, (2021) arXiv:2111.04808
- [255]
- V.I. Levenshtein, Application of Hadamard matrices to a problem in coding theory, Problems of Cybernetics, vol. 5, GIFML, Moscow, 1961, 125–136.
- [256]
- Levenshtein, V. I. (1960). A class of systematic codes. In Doklady Akademii Nauk (Vol. 131, No. 5, pp. 1011-1014). Russian Academy of Sciences.
- [257]
- J. Conway and N. Sloane, “Lexicographic codes: Error-correcting codes from game theory”, IEEE Transactions on Information Theory 32, 337 (1986) DOI
- [258]
- F. R. Kschischang, P. G. de Buda, and S. Pasupathy, “Block coset codes for M-ary phase shift keying”, IEEE Journal on Selected Areas in Communications 7, 900 (1989) DOI
- [259]
- G. D. Forney, “Geometrically uniform codes”, IEEE Transactions on Information Theory 37, 1241 (1991) DOI
- [260]
- H.-A. Loeliger, “Signal sets matched to groups”, IEEE Transactions on Information Theory 37, 1675 (1991) DOI
- [261]
- J. L. Massey, “Linear codes with complementary duals”, Discrete Mathematics 106–107, 337 (1992) DOI
- [262]
- D. Boucher and F. Ulmer, “Linear codes using skew polynomials with automorphisms and derivations”, Designs, Codes and Cryptography 70, 405 (2012) DOI
- [263]
- S. Liu, F. Manganiello, and F. R. Kschischang, “Construction and decoding of generalized skew-evaluation codes”, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT) (2015) DOI
- [264]
- U. Martínez-Peñas, “Skew and linearized Reed-Solomon codes and maximum sum rank distance codes over any division ring”, (2018) arXiv:1710.03109
- [265]
- J. Katz and L. Trevisan, “On the efficiency of local decoding procedures for error-correcting codes”, Proceedings of the thirty-second annual ACM symposium on Theory of computing (2000) DOI
- [266]
- L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy, “Checking computations in polylogarithmic time”, Proceedings of the twenty-third annual ACM symposium on Theory of computing - STOC ’91 21 (1991) DOI
- [267]
- Sanjeev Arora. Probabilistic checking of proofs and hardness of approximation problems. UC Berkeley, 1994.
- [268]
- R. Rubinfeld and M. Sudan, “Robust Characterizations of Polynomials with Applications to Program Testing”, SIAM Journal on Computing 25, 252 (1996) DOI
- [269]
- K. Friedl and M. Sudan, “Some Improvements to Total Degree Tests”, (2013) arXiv:1307.3975
- [270]
- J. Håstad, “Some optimal inapproximability results”, Journal of the ACM 48, 798 (2001) DOI
- [271]
- M. Bellare, O. Goldreich, and M. Sudan, “Free Bits, PCPs, and Nonapproximability---Towards Tight Results”, SIAM Journal on Computing 27, 804 (1998) DOI
- [272]
- P. Harsha et al., “Limits of Approximation Algorithms: PCPs and Unique Games (DIMACS Tutorial Lecture Notes)”, (2010) arXiv:1002.3864
- [273]
- Gaborit, P., Murat, G., Ruatta, O., & Zemor, G. (2013, April). Low rank parity check codes and their application to cryptography. In Proceedings of the Workshop on Coding and Cryptography WCC (Vol. 2013).
- [274]
- M. Luby, “LT codes”, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings. DOI
- [275]
- D. J. C. MacKay and R. M. Neal, “Good codes based on very sparse matrices”, Cryptography and Coding 100 (1995) DOI
- [276]
- D. J. C. MacKay, “Good error-correcting codes based on very sparse matrices”, IEEE Transactions on Information Theory 45, 399 (1999) DOI
- [277]
- K. KASAI and K. SAKANIWA, “Spatially-Coupled MacKay-Neal Codes and Hsu-Anastasopoulos Codes”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, 2161 (2011) arXiv:1102.4612 DOI
- [278]
- J. Rosenthal and P. O. Vontobel, “Constructions of regular and irregular LDPC codes using Ramanujan graphs and ideas from Margulis”, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252) DOI
- [279]
- T. Blackmore and G. H. Norton, “Matrix-Product Codes over ? q”, Applicable Algebra in Engineering, Communication and Computing 12, 477 (2001) DOI
- [280]
- M. Blaum, J. L. Hafner, and S. Hetzler, “Partial-MDS Codes and their Application to RAID Type of Architectures”, (2014) arXiv:1205.0997
- [281]
- P. Gopalan, C. Huang, B. Jenkins, and S. Yekhanin, “Explicit Maximally Recoverable Codes with Locality”, (2013) arXiv:1307.4150
- [282]
- R. Singleton, “Maximum distance&lt;tex&gt;q&lt;/tex&gt;-nary codes”, IEEE Transactions on Information Theory 10, 116 (1964) DOI
- [283]
- E. M. Gabidulin, "Theory of Codes with Maximum Rank Distance", Problemy Peredachi Informacii, Volume 21, Issue 1, 3–16 (1985)
- [284]
- O. Meir, “Combinatorial construction of locally testable codes”, Proceedings of the fortieth annual ACM symposium on Theory of computing 285 (2008) DOI
- [285]
- C. M. Melas, “A Cyclic Code for Double Error Correction [Letter to the Editor]”, IBM Journal of Research and Development 4, 364 (1960) DOI
- [286]
- G. van der Geer and M. van der Vlugt, “Generalized Hamming Weights of Melas Codes and Dual Melas Codes”, SIAM Journal on Discrete Mathematics 7, 554 (1994) DOI
- [287]
- A. Alahmadi, H. Alhazmi, T. Helleseth, R. Hijazi, N. Muthana, and P. Solé, “On the lifted Melas code”, Cryptography and Communications 8, 7 (2015) DOI
- [288]
- J. B. Anderson and A. Svensson, Coded Modulation Systems (Springer US, 2002) DOI
- [289]
- A. Lapidoth, A Foundation in Digital Communication (Cambridge University Press, 2017) DOI
- [290]
- B. L. Hughes, “Differential space-time modulation”, IEEE Transactions on Information Theory 46, 2567 (2000) DOI
- [291]
- Richardson, Tom, and Rüdiger Urbanke. "Multi-edge type LDPC codes." Workshop honoring Prof. Bob McEliece on his 60th birthday, California Institute of Technology, Pasadena, California. 2002.
- [292]
- M. Yu. Rosenbloom, M. A. Tsfasman, “Codes for the m-Metric”, Probl. Peredachi Inf., 33:1 (1997), 55–63; Problems Inform. Transmission, 33:1 (1997), 45–52
- [293]
- Rasmus R. Nielsen. List decoding of linear block codes. PhD thesis, Technical University of Denmark, 2001
- [294]
- S. Kopparty, S. Saraf, and S. Yekhanin, “High-rate codes with sublinear-time decoding”, Journal of the ACM 61, 1 (2014) DOI
- [295]
- M. Nadler, “A 32-point n=12, d=5 code (Corresp.)”, IRE Transactions on Information Theory 8, 58 (1962) DOI
- [296]
- Bush, K. A. “Orthogonal Arrays of Index Unity.” The Annals of Mathematical Statistics 23, no. 3 (1952): 426–34.
- [297]
- I. S. Reed and G. Solomon, “Polynomial Codes Over Certain Finite Fields”, Journal of the Society for Industrial and Applied Mathematics 8, 300 (1960) DOI
- [298]
- S. Johnson, “A new upper bound for error-correcting codes”, IEEE Transactions on Information Theory 8, 203 (1962) DOI
- [299]
- J. M. Goethals and S. L. Snover, “Nearly perfect binary codes”, Discrete Mathematics 3, 65 (1972) DOI
- [300]
- N. V. Semakov, V. A. Zinov'ev, G. V. Zaitsev, “Uniformly Packed Codes”, Probl. Peredachi Inf., 7:1 (1971), 38–50; Problems Inform. Transmission, 7:1 (1971), 30–39
- [301]
- M. E. J. Newman and C. Moore, “Glassy dynamics and aging in an exactly solvable spin model”, Physical Review E 60, 5068 (1999) arXiv:cond-mat/9707273 DOI
- [302]
- D. R. Chowdhury, S. Basu, I. S. Gupta, and P. P. Chaudhuri, “Design of CAECC - cellular automata based error correcting code”, IEEE Transactions on Computers 43, 759 (1994) DOI
- [303]
- H. Niederreiter, “Point sets and sequences with small discrepancy”, Monatshefte für Mathematik 104, 273 (1987) DOI
- [304]
- H. Niederreiter, “A combinatorial problem for vector spaces over finite fields”, Discrete Mathematics 96, 221 (1991) DOI
- [305]
- H. Niederreiter, “Orthogonal arrays and other combinatorial aspects in the theory of uniform point distributions in unit cubes”, Discrete Mathematics 106–107, 361 (1992) DOI
- [306]
- H.-V. Niemeier, “Definite quadratische formen der dimension 24 und diskriminante 1”, Journal of Number Theory 5, 142 (1973) DOI
- [307]
- N. D. Elkies, “Excellent nonlinear codes from modular curves”, (2001) arXiv:math/0104115
- [308]
- Chaoping Xing, “Nonlinear codes from algebraic curves improving the Tsfasman-Vladut-Zink bound”, IEEE Transactions on Information Theory 49, 1653 (2003) DOI
- [309]
- N. D. Elkies, “Still better nonlinear codes from modular curves”, (2003) arXiv:math/0308046
- [310]
- H. Niederreiter and F. Özbudak, “Constructive Asymptotic Codes with an Improvement on the Tsfasman-Vlăduţ-Zink and Xing Bounds”, Coding, Cryptography and Combinatorics 259 (2004) DOI
- [311]
- H. Stichtenoth and C. Xing, “Excellent Nonlinear Codes From Algebraic Function Fields”, IEEE Transactions on Information Theory 51, 4044 (2005) DOI
- [312]
- A. W. Nordstrom and J. P. Robinson, “An optimum nonlinear code”, Information and Control 11, 613 (1967) DOI
- [313]
- N. V. Semakov, V. A. Zinovev, Complete and Quasi-complete Balanced Codes, Probl. Peredachi Inf., 5:2 (1969), 14–18; Problems Inform. Transmission, 5:2 (1969), 11–13
- [314]
- O. Geil, “On codes from norm–trace curves”, Finite Fields and Their Applications 9, 351 (2003) DOI
- [315]
- J. H. Conway and N. J. A. Sloane, “Self-dual codes over the integers modulo 4”, Journal of Combinatorial Theory, Series A 62, 30 (1993) DOI
- [316]
- E. M. Rains and N. J. A. Sloane, “Self-Dual Codes”, (2002) arXiv:math/0208001
- [317]
- Nilsson, Nils J. "Learning machines." (1965).
- [318]
- S. Knerr, L. Personnaz, and G. Dreyfus, “Handwritten digit recognition by neural networks with single-layer training”, IEEE Transactions on Neural Networks 3, 962 (1992) DOI
- [319]
- T. Hastie and R. Tibshirani, “Classification by pairwise coupling”, The Annals of Statistics 26, (1998) DOI
- [320]
- P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin, “On the Locality of Codeword Symbols”, (2011) arXiv:1106.3625
- [321]
- D. S. Papailiopoulos and A. G. Dimakis, “Locally Repairable Codes”, (2014) arXiv:1206.3804
- [322]
- C. R. Rao, Hypercubes of strength d leading to confounded designs in factorial experiments. Bull. Calcutta Math. Soc., 38, 67-78.
- [323]
- C. R. Rao, “Factorial Experiments Derivable from Combinatorial Arrangements of Arrays”, Supplement to the Journal of the Royal Statistical Society 9, 128 (1947) DOI
- [324]
- C. R. Rao, “On a Class of Arrangements”, Proceedings of the Edinburgh Mathematical Society 8, 119 (1949) DOI
- [325]
- B. Qvist. Some remarks concerning curves of the second degree in a finite plane. Suomalainen tiedeakatemia, 1952.
- [326]
- R. Calderbank and W. M. Kantor, “The Geometry of Two-Weight Codes”, Bulletin of the London Mathematical Society 18, 97 (1986) DOI
- [327]
- A. Barg and G. Zemor, “Concatenated Codes: Serial and Parallel”, IEEE Transactions on Information Theory 51, 1625 (2005) DOI
- [328]
- L. Pamies-Juarez, H. D. L. Hollmann, and F. Oggier, “Locally repairable codes with multiple repair alternatives”, 2013 IEEE International Symposium on Information Theory (2013) arXiv:1302.5518 DOI
- [329]
- F. Parvaresh and A. Vardy, “Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time”, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05) 285 DOI
- [330]
- J. H. Conway and N. J. A. Sloane, “Quaternary constructions for the binary single-error-correcting codes of Julin, Best and others”, Designs, Codes and Cryptography 4, 31 (1994) DOI
- [331]
- D. Slepian, “Permutation modulation”, Proceedings of the IEEE 53, 228 (1965) DOI
- [332]
- I. Ingemarsson, “Optimized permutation modulation”, IEEE Transactions on Information Theory 36, 1098 (1990) DOI
- [333]
- J. Haah, M. B. Hastings, D. Poulin, and D. Wecker, “Magic state distillation with low space overhead and optimal asymptotic input count”, Quantum 1, 31 (2017) arXiv:1703.07847 DOI
- [334]
- C. Bachoc and F. Vallentin, “Optimality and uniqueness of the (4,10,1/6) spherical code”, Journal of Combinatorial Theory, Series A 116, 195 (2009) arXiv:0708.3947 DOI
- [335]
- J. Justesen, K. J. Larsen, H. E. Jensen, A. Havemose, and T. Hoholdt, “Construction and decoding of a class of algebraic geometry codes”, IEEE Transactions on Information Theory 35, 811 (1989) DOI
- [336]
- V. Pless, On a new family of symmetry codes and related new five-designs, BAMS 75 (1969), 1339-1342
- [337]
- V. Pless, “Symmetry codes over GF(3) and new five-designs”, Journal of Combinatorial Theory, Series A 12, 119 (1972) DOI
- [338]
- E. Arikan, “Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels”, IEEE Transactions on Information Theory 55, 3051 (2009) DOI
- [339]
- L.-H. Zetterberg, “A class of codes for polyphase signals on a bandlimited Gaussian channel”, IEEE Transactions on Information Theory 11, 385 (1965) DOI
- [340]
- L.-H. Zetterberg, “Detection of a class of coded and phase-modulated signals”, IEEE Transactions on Information Theory 12, 153 (1966) DOI
- [341]
- Einarsson, Göran. "Polyphase coding for a Gaussian channel(Polyphase coding for Gaussian channel, investigating PM signal transmission over channel disturbed by additive white Gaussian noise)." Ericsson Technics 24.2 (1968): 75-130.
- [342]
- Einarsson, Göran. Performance of polyphase signals on a Gaussian channel. 1966.
- [343]
- Ottoson, Ragnar. "Performance of phase- and amplitude-modulated signals on a Gaussian channel(Phase and amplitude modulated signals transmission over band limited channel disturbed by additive white Gaussian noise)." Ericsson Technics 25.3 (1969): 153-198.
- [344]
- Nilsson, Magnus. "Linear block codes over rings for phase shift keying." Thesis no. 331, Linkoping University (1993).
- [345]
- P. Piret, “Bounds for codes over the unit circle”, IEEE Transactions on Information Theory 32, 760 (1986) DOI
- [346]
- V. V. Ginzburg, “Multidimensional Signals for a Continuous Channel”, Probl. Peredachi Inf., 20:1 (1984), 28–46; Problems Inform. Transmission, 20:1 (1984), 20–34
- [347]
- Portnoi, S. L. "Characterizations of modulation and encoding systems as concatenated codes." Probl. Inform. Transm. 21.3 (1985): 14-27.
- [348]
- V. V. Zyablov, S. L. Portnoi, “Modulation/Coding System for a Gaussian Channel”, Probl. Peredachi Inf., 23:3 (1987), 18–26; Problems Inform. Transmission, 23:3 (1987), 187–193
- [349]
- V.A. Zinoviev, S.N. Litsyn and S.L. Portnoi, Cascade codes in Euclidean space, Problems of Information Transmission, Vol. 25, No. 3, pp. 62-75, 1989.
- [350]
- H. S. M. Coxeter. Regular Complex Polytopes. Cambridge University Press, 1991.
- [351]
- R. A. Brualdi, J. S. Graves, and K. M. Lawrence, “Codes with a poset metric”, Discrete Mathematics 147, 57 (1995) DOI
- [352]
- F. P. Preparata, “A class of optimum nonlinear double-error-correcting codes”, Information and Control 13, 378 (1968) DOI
- [353]
- B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private information retrieval”, Journal of the ACM 45, 965 (1998) DOI
- [354]
- B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private information retrieval”, Proceedings of IEEE 36th Annual Foundations of Computer Science DOI
- [355]
- K. V. Rashmi, N. B. Shah, and P. V. Kumar, “Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction”, IEEE Transactions on Information Theory 57, 5227 (2011) arXiv:1005.4178 DOI
- [356]
- A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network Coding for Distributed Storage Systems”, IEEE Transactions on Information Theory 56, 4539 (2010) DOI
- [357]
- G. Lachaud, “The parameters of projective Reed–Müller codes”, Discrete Mathematics 81, 217 (1990) DOI
- [358]
- A. B. Sorensen, “Projective Reed-Muller codes”, IEEE Transactions on Information Theory 37, 1567 (1991) DOI
- [359]
- Thorpe, Jeremy. "Low-density parity-check (LDPC) codes constructed from protographs." IPN progress report 42.154 (2003): 42-154.
- [360]
- D. Divsalar, C. Jones, S. Dolinar, and J. Thorpe, “Protograph based LDPC codes with minimum distance linearly growing with block size”, GLOBECOM ’05. IEEE Global Telecommunications Conference, 2005. (2005) DOI
- [361]
- D. Divsalar, S. Dolinar, and C. Jones, “Protograph LDPC Codes over Burst Erasure Channels”, MILCOM 2006 (2006) DOI
- [362]
- C. Huang, M. Chen, and J. Li, “Pyramid Codes”, ACM Transactions on Storage 9, 1 (2013) DOI
- [363]
- P. A. Baker, “Phase-modulation data sets for serial transmission at 2,000 and 2,400 bits per second”, Transactions of the American Institute of Electrical Engineers, Part I: Communication and Electronics 81, 166 (1962) DOI
- [364]
- J. Wolfmann, “Codes projectifs a deux ou trois poids associfs aux hyperquadriques d’une geometrie finie”, Discrete Mathematics 13, 185 (1975) DOI
- [365]
- Y. Aubry, “Reed-Muller codes associated to projective algebraic varieties”, Lecture Notes in Mathematics 4 (1992) DOI
- [366]
- H. Jin, T. Richardson, V. Novichkov, "Error Correction of Algebraic Block Codes". U.S. Patent, Number US8751902B2 2002
- [367]
- A. Yahya, O. Sidek, M. F. M. Salleh, and F. Ghani, “A new Quasi-Cyclic low density parity check codes”, 2009 IEEE Symposium on Industrial Electronics & Applications (2009) DOI
- [368]
- B. Vasic, “Combinatorial constructions of low-density parity check codes for iterative decoding”, Proceedings IEEE International Symposium on Information Theory, DOI
- [369]
- I. Djurdjevic, Jun Xu, K. Abdel-Ghaffar, and Shu Lin, “A class of low-density parity-check codes constructed based on Reed-Solomon codes with two information symbols”, IEEE Communications Letters 7, 317 (2003) DOI
- [370]
- T. Okamura, “Designing LDPC codes using cyclic shifts”, IEEE International Symposium on Information Theory, 2003. Proceedings. (2003) DOI
- [371]
- M. P. C. Fossorier, “Quasi-Cyclic Low-Density Parity-Check Codes From Circulant Permutation Matrices”, IEEE Transactions on Information Theory 50, 1788 (2004) DOI
- [372]
- I. E. Bocharova, F. Hug, R. Johannesson, B. D. Kudryashov, and R. V. Satyukov, “Searching for Voltage Graph-Based LDPC Tailbiting Codes With Large Girth”, IEEE Transactions on Information Theory 58, 2265 (2012) arXiv:1108.0840 DOI
- [373]
- R. Townsend and E. Weldon, “Self-orthogonal quasi-cyclic codes”, IEEE Transactions on Information Theory 13, 183 (1967) DOI
- [374]
- A. R. Hammons Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Solé, “The Z_4-Linearity of Kerdock, Preparata, Goethals and Related Codes”, (2002) arXiv:math/0207208
- [375]
- Anxiao Jiang, M. Schwartz, and J. Bruck, “Error-correcting codes for rank modulation”, 2008 IEEE International Symposium on Information Theory 1736 (2008) DOI
- [376]
- A. Mazumdar, A. Barg, and G. Zémor, “Constructions of Rank Modulation Codes”, (2011) arXiv:1110.2557
- [377]
- A. Shokrollahi, “Raptor codes”, IEEE Transactions on Information Theory 52, 2551 (2006) DOI
- [378]
- Petar Maymounkov, Online codes, Technical report, New York University, 2002.
- [379]
- V. M. Sidelnikov, On a finite group of matrices and codes on the Euclidean sphere (in Russian), Probl. Peredach. Inform. 33 (1997), 35–54 (1997); English translation in Problems Inform. Transmission 33 (1997), 29–44
- [380]
- V. M. Sidelnikov, “On a finite group of matrices generating orbit codes on Euclidean sphere”, Proceedings of IEEE International Symposium on Information Theory 436 DOI
- [381]
- G. Nebe, E. M. Rains, and N. J. A. Sloane, “The invariants of the Clifford groups”, (2000) arXiv:math/0001038
- [382]
- D. E. Muller, “Application of Boolean algebra to switching circuit design and to error detection”, Transactions of the I.R.E. Professional Group on Electronic Computers EC-3, 6 (1954) DOI
- [383]
- I. Reed, “A class of multiple-error-correcting codes and the decoding scheme”, Transactions of the IRE Professional Group on Information Theory 4, 38 (1954) DOI
- [384]
- N. Mitani, On the transmission of numbers in a sequential computer, delivered at the National Convention of the Inst. of Elect. Engineers of Japan, November 1951.
- [385]
- R. Tanner, “A recursive approach to low complexity codes”, IEEE Transactions on Information Theory 27, 533 (1981) DOI
- [386]
- Divsalar, Dariush, Hui Jin, and Robert J. McEliece. "Coding theorems for" turbo-like" codes." Proceedings of the annual Allerton Conference on Communication control and Computing. Vol. 36. University Of Illinois, 1998.
- [387]
- Johnson, Sarah J. "Introducing low-density parity-check codes." University of Newcastle, Australia 1 (2006): 2006.
- [388]
- L. Bazzi, M. Mahdian, and D. A. Spielman, “The Minimum Distance of Turbo-Like Codes”, IEEE Transactions on Information Theory 55, 6 (2009) DOI
- [389]
- R. M. Roth and A. Lempel, “A construction of non-Reed-Solomon type MDS codes”, IEEE Transactions on Information Theory 35, 655 (1989) DOI
- [390]
- Corbett, P., English, B., Goel, A., Grcanac, T., Kleiman, S., Leong, J., & Sankar, S. (2004, March). Row-diagonal parity for double disk failure correction. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (pp. 1-14).
- [391]
- C. Lomont, “Error Correcting Codes on Algebraic Surfaces”, (2003) arXiv:math/0309123
- [392]
- S. R. Ghorpade and G. Lachaud, “Higher Weights of Grassmann Codes”, Coding Theory, Cryptography and Related Areas 122 (2000) DOI
- [393]
- Hao Chen, “On the minimum distances of Schubert codes”, IEEE Transactions on Information Theory 46, 1535 (2000) DOI
- [394]
- M. González-Sarabia, C. Renterı́a, and H. Tapia-Recillas, “Reed-Muller-Type Codes Over the Segre Variety”, Finite Fields and Their Applications 8, 511 (2002) DOI
- [395]
- N. V. Semakov, V. A. Zinoviev, G. V. Zaitsev, “A Class of Maximum Equidistant Codes”, Probl. Peredachi Inf., 5:2 (1969), 84–87; Problems Inform. Transmission, 5:2 (1969), 65–68
- [396]
- N. Prakash, V. Lalitha, and P. V. Kumar, “Codes with Locality for Two Erasures”, (2014) arXiv:1401.2422
- [397]
- S. B. Balaji, G. R. Kini, and P. V. Kumar, “A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures”, (2018) arXiv:1812.02502
- [398]
- V. I. Levenshtein, “Universal bounds for codes and designs,” in Handbook of Coding Theory 1, eds. V. S. Pless and W. C. Huffman. Amsterdam: Elsevier, 1998, pp.499-648.
- [399]
- D. Boucher, W. Geiselmann, and F. Ulmer, “Skew-cyclic codes”, (2006) arXiv:math/0604603
- [400]
- D. Slepian, “Group Codes for the Gaussian Channel”, Bell System Technical Journal 47, 575 (1968) DOI
- [401]
- T. Mittelholzer and J. Lahtonen, “Group codes generated by finite reflection groups”, IEEE Transactions on Information Theory 42, 519 (1996) DOI
- [402]
- N. Sloane and D. Whitehead, “New family of single-error correcting codes”, IEEE Transactions on Information Theory 16, 717 (1970) DOI
- [403]
- Sloane, N. J. A., R. H. Hardin, and W. D. Smith. "Tables of spherical codes." collaboration with R. H. Hardin, W. D. Smith and others. Published electronically at https://neilsloane.com/packings/ (2004).
- [404]
- B. Ballinger, G. Blekherman, H. Cohn, N. Giansiracusa, E. Kelly, and A. Schürmann, “Experimental Study of Energy-Minimizing Point Configurations on Spheres”, Experimental Mathematics 18, 257 (2009) arXiv:math/0611451 DOI
- [405]
- B. M. Hochwald and T. L. Marzetta, “Unitary space-time modulation for multiple-antenna communications in Rayleigh flat fading”, IEEE Transactions on Information Theory 46, 543 (2000) DOI
- [406]
- B. M. Hochwald, T. L. Marzetta, T. J. Richardson, W. Sweldens, and R. Urbanke, “Systematic design of unitary space-time constellations”, IEEE Transactions on Information Theory 46, 1962 (2000) DOI
- [407]
- B. M. Hochwald and W. Sweldens, “Differential unitary space-time modulation”, IEEE Transactions on Communications 48, 2041 (2000) DOI
- [408]
- V. Tarokh, N. Seshadri, and A. R. Calderbank, “Space-time codes for high data rate wireless communication: performance criterion and code construction”, IEEE Transactions on Information Theory 44, 744 (1998) DOI
- [409]
- S. Kudekar, T. J. Richardson, and R. L. Urbanke, “Threshold Saturation via Spatial Coupling: Why Convolutional LDPC Ensembles Perform So Well over the BEC”, IEEE Transactions on Information Theory 57, 803 (2011) DOI
- [410]
- S. Kudekar, T. Richardson, and R. L. Urbanke, “Spatially Coupled Ensembles Universally Achieve Capacity Under Belief Propagation”, IEEE Transactions on Information Theory 59, 7761 (2013) DOI
- [411]
- H. Esfahanizadeh, A. Hareedy, and L. Dolecek, “Finite-Length Construction of High Performance Spatially-Coupled Codes via Optimized Partitioning and Lifting”, IEEE Transactions on Communications 67, 3 (2019) DOI
- [412]
- V. A. Kotelnikov, “The theory of optimum noise immunity,” PhD Thesis, Molotov Energy Institute, Moscow, Jan. 1947
- [413]
- C. E. Shannon, “Communication in the Presence of Noise”, Proceedings of the IRE 37, 10 (1949) DOI
- [414]
- P. Delsarte, J. M. Goethals, and J. J. Seidel, “Spherical codes and designs”, Geometriae Dedicata 6, 363 (1977) DOI
- [415]
- V. I. Levenshtein, "On choosing polynomials to obtain bounds in packing problems." Proc. Seventh All-Union Conf. on Coding Theory and Information Transmission, Part II, Moscow, Vilnius. 1978.
- [416]
- V. I. Levenshtein, “On bounds for packings in n-dimensional Euclidean space”, Dokl. Akad. Nauk SSSR, 245:6 (1979), 1299–1303
- [417]
- H. Cohn, “Packing, coding, and ground states”, (2016) arXiv:1603.05202
- [418]
- C. Huang and L. Xu, “STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures”, IEEE Transactions on Computers 57, 889 (2008) DOI
- [419]
- R. Koetter and F. R. Kschischang, “Coding for Errors and Erasures in Random Network Coding”, IEEE Transactions on Information Theory 54, 3579 (2008) DOI
- [420]
- Cameron, Peter J. "Generalisation of Fisher’s inequality to fields with more than one element." Combinatorics, London Math. Soc. Lecture Note Ser 13 (1973): 9-13.
- [421]
- V. Guruswami and C. Xing, “List decoding reed-solomon, algebraic-geometric, and gabidulin subcodes up to the singleton bound”, Proceedings of the forty-fifth annual ACM symposium on Theory of Computing (2013) DOI
- [422]
- R. W. Nobrega and B. F. Uchoa-Filho, “Multishot Codes for Network Coding using Rank-Metric Codes”, (2010) arXiv:1001.2059
- [423]
- Mooers, Calvin N. "Application of random codes to the gathering of statistical information." PhD diss., Massachusetts Institute of Technology, 1948.
- [424]
- G. OROSZ and L. TAKÁCS, “SOME PROBABILITY PROBLEMS CONCERNING THE MARKING OF CODES INTO THE SUPERIMPOSITION FIELD”, Journal of Documentation 12, 231 (1956) DOI
- [425]
- S. Stiassny, “Mathematical analysis of various superimposed coding methods”, American Documentation 11, 155 (1960) DOI
- [426]
- W. Kautz and R. Singleton, “Nonrandom binary superimposed codes”, IEEE Transactions on Information Theory 10, 363 (1964) DOI
- [427]
- J. P. Hansen and H. Stichtenoth, “Group codes on certain algebraic curves with many rational points”, Applicable Algebra in Engineering, Communication and Computing 1, 67 (1990) DOI
- [428]
- A. Ta-Shma, “Explicit, almost optimal, epsilon-balanced codes”, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing (2017) DOI
- [429]
- F. G. Jeronimo, D. Quintana, S. Srivastava, and M. Tulsiani, “Unique Decoding of Explicit \(ε\)-balanced Codes Near the Gilbert-Varshamov Bound”, (2020) arXiv:2011.05500
- [430]
- I. Tamo and A. Barg, “A Family of Optimal Locally Recoverable Codes”, IEEE Transactions on Information Theory 60, 4661 (2014) arXiv:1311.3284 DOI
- [431]
- A. Barg, I. Tamo, and S. Vladut, “Locally recoverable codes on algebraic curves”, (2015) arXiv:1501.04904
- [432]
- A. Barg, I. Tamo, and S. Vladut, “Locally recoverable codes on algebraic curves”, 2015 IEEE International Symposium on Information Theory (ISIT) (2015) arXiv:1603.08876 DOI
- [433]
- C. A. Kelley, "Codes over Graphs." Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021) DOI
- [434]
- P. Elias, “Error-free Coding”, Transactions of the IRE Professional Group on Information Theory 4, 29 (1954) DOI
- [435]
- H. Burton and E. Weldon, “Cyclic product codes”, IEEE Transactions on Information Theory 11, 433 (1965) DOI
- [436]
- W. Gore, “Further results on product codes”, IEEE Transactions on Information Theory 16, 446 (1970) DOI
- [437]
- Veikkaus-Lotto (Veikkaaja) magazine, issues 27, 28, and 33, August-September 1947.
- [438]
- M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman, “Efficient erasure correcting codes”, IEEE Transactions on Information Theory 47, 569 (2001) DOI
- [439]
- I. F. Blake, "Coding for Erasures and Fountain Codes." Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021) DOI
- [440]
- C. Torezzan, S. I. R. Costa, and V. A. Vaishampayan, “Spherical codes on torus layers”, 2009 IEEE International Symposium on Information Theory 2033 (2009) DOI
- [441]
- H. K. Miyamoto, H. N. Sa Earp, and S. I. R. Costa, “Constructive spherical codes in 2\({}^{\text{k}}\) dimensions”, 2019 IEEE International Symposium on Information Theory (ISIT) 1612 (2019) DOI
- [442]
- B. Chor, A. Fiat, M. Naor, and B. Pinkas, “Tracing traitors”, IEEE Transactions on Information Theory 46, 893 (2000) DOI
- [443]
- M. A. Tsfasman, S. G. Vlădutx, and Th. Zink, “Modular curves, Shimura curves, and Goppa codes, better than Varshamov‐Gilbert bound”, Mathematische Nachrichten 109, 21 (1982) DOI
- [444]
- C. Berrou and A. Glavieux, “Near optimum error correcting coding and decoding: turbo-codes”, IEEE Transactions on Communications 44, 1261 (1996) DOI
- [445]
- C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1”, Proceedings of ICC ’93 - IEEE International Conference on Communications DOI
- [446]
- J. Bierbrauer and Y. Edel, “New code parameters from Reed-Solomon subfield codes”, IEEE Transactions on Information Theory 43, 953 (1997) DOI
- [447]
- J. Bierbrauer and Y. Edel, “Extending and LengtheningBCHCodes”, Finite Fields and Their Applications 3, 314 (1997) DOI
- [448]
- Y. Edel and J. Bierbauer, “Twisted BCH-codes”, Journal of Combinatorial Designs 5, 377 (1997) DOI
- [449]
- H. C. A. van Tilborg. Uniformly packed codes. Technische Hogeschool Eindhoven, 1976.
- [450]
- J. M. Goethals and H. C. A. Van Tilborg. “Uniformly packed codes”. In Philips Research Reports 30.1 (1975)
- [451]
- V. I. Levenshtein. Bounds for packings of metric spaces and some of their applications. Problemy Kibernet, 40 (1983), 43-110.
- [452]
- V. I. Levenshtein, “Krawtchouk polynomials and universal bounds for codes and designs in Hamming spaces”, IEEE Transactions on Information Theory 41, 1303 (1995) DOI
- [453]
- P. G. Boyvalenkov, P. D. Dragnev, D. P. Hardin, E. B. Saff, and M. M. Stoyanova, “Energy bounds for codes and designs in Hamming spaces”, Designs, Codes and Cryptography 82, 411 (2016) DOI
- [454]
- A. Askikhmin, A. Barg, and S. Litsyn, “Estimates of the distance distribution of codes and designs”, IEEE Transactions on Information Theory 47, 1050 (2001) DOI
- [455]
- H. Cohn and Y. Zhao, “Energy-Minimizing Error-Correcting Codes”, IEEE Transactions on Information Theory 60, 7442 (2014) arXiv:1212.1913 DOI
- [456]
- G. A. Kabatiansky, V. I. Levenshtein, “On Bounds for Packings on a Sphere and in Space”, Probl. Peredachi Inf., 14:1 (1978), 3–25; Problems Inform. Transmission, 14:1 (1978), 1–17
- [457]
- H. Cohn, A. Kumar, and G. Minton, “Optimal simplices and codes in projective spaces”, Geometry & Topology 20, 1289 (2016) arXiv:1308.3188 DOI
- [458]
- A. Glazyrin, “Moments of isotropic measures and optimal projective codes”, (2020) arXiv:1904.11159
- [459]
- V. A. Yudin, “Minimum potential energy of a point system of charges”, Diskr. Mat., 4:2 (1992), 115–121; Discrete Math. Appl., 3:1 (1993), 75–81
- [460]
- A. V. Kolushov, V. A. Yudin, А. В. Колущов, and В. А. Удин, “Extremal dispositions of points on the sphere”, Analysis Mathematica 23, 25 (1997) DOI
- [461]
- E. B. Saff and A. B. J. Kuijlaars, “Distributing many points on a sphere”, The Mathematical Intelligencer 19, 5 (1997) DOI
- [462]
- P. Boyvalenkov, D. Danev, "Linear programming bounds." Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021) DOI
- [463]
- J. S. Brauchart and P. J. Grabner, “Distributing many points on spheres: Minimal energy and designs”, Journal of Complexity 31, 293 (2015) arXiv:1407.8282 DOI
- [464]
- R. R. Varshamov and G. M. Tenengolts, Codes which correct single asymmetric errors (translated to English), Autom. Remote Control, 26(2), 286-290 (1965)
- [465]
- V. I. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals (translated to English), Soviet Physics Dokl., 10(8), 707-710 (1966).
- [466]
- J. L. Vasilyev On nongroup close-packed codes (in Russian), Probl. Kibernet., 8 (1962), 337-339, translated in Probleme der Kibernetik 8 (1965), 375-378.
- [467]
- R. W. Hamming, Letter, April 5, 1978.
- [468]
- E. Bannai and N. J. A. Sloane, “Uniqueness of Certain Spherical Codes”, Canadian Journal of Mathematics 33, 437 (1981) DOI
- [469]
- H. Cohn and A. Kumar, “Uniqueness of the (22,891,1/4) spherical code”, (2007) arXiv:math/0607448
- [470]
- J. L. Massey, Threshold Decoding. Cambridge, MA: M.I.T. Press, 1963.
- [471]
- J. Hamkins and K. Zeger, “Asymptotically dense spherical codes. I. Wrapped spherical codes”, IEEE Transactions on Information Theory 43, 1774 (1997) DOI
- [472]
- Lihao Xu and J. Bruck, “X-code: MDS array codes with optimal encoding”, IEEE Transactions on Information Theory 45, 272 (1999) DOI
- [473]
- M. Ye and A. Barg, “Explicit constructions of high-rate MDS array codes with optimal repair bandwidth”, (2016) arXiv:1604.00454
- [474]
- M. Ye and A. Barg, “Explicit constructions of optimal-access MDS codes with nearly optimal sub-packetization”, (2017) arXiv:1605.08630
- [475]
- L.-H. Zetterberg, “Cyclic codes from irreducible polynomials for correction of multiple errors”, IEEE Transactions on Information Theory 8, 13 (1962) DOI
- [476]
- I. Tamo, Z. Wang, and J. Bruck, “Zigzag Codes: MDS Array Codes With Optimal Rebuilding”, IEEE Transactions on Information Theory 59, 1597 (2013) arXiv:1112.0371 DOI
- [477]
- M. Plotkin, “Binary codes with specified minimum distance”, IEEE Transactions on Information Theory 6, 445 (1960) DOI
- [478]
- N. V. Semakov, V. A. Zinoviev, “Equidistant q-ary Codes with Maximal Distance and Resolvable Balanced Incomplete Block Designs”, Probl. Peredachi Inf., 4:2 (1968), 3–10; Problems Inform. Transmission, 4:2 (1968), 1–7
- [479]
- R. A. FISHER, “THE THEORY OF CONFOUNDING IN FACTORIAL EXPERIMENTS IN RELATION TO THE THEORY OF GROUPS”, Annals of Eugenics 11, 341 (1941) DOI
- [480]
- R. W. Hamming, “Error Detecting and Error Correcting Codes”, Bell System Technical Journal 29, 147 (1950) DOI
- [481]
- S. K. Houghten, C. W. H. Lam, L. H. Thiel, and J. A. Parker, “The extended quadratic residue code is the only (48,24,12) self-dual doubly-even code”, IEEE Transactions on Information Theory 49, 53 (2003) DOI
- [482]
- Hill, R. (1973). On the largest size of cap in s53. Atti della Accademia Nazionale dei Lincei. Classe di Scienze Fisiche, Matematiche e Naturali. Rendiconti, 54(3), 378-384.
- [483]
- A. E. Brouwer, "Two-weight Codes." Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021) DOI
- [484]
- R. A. Games, “The packing problem for projective geometries over GF(3) with dimension greater than five”, Journal of Combinatorial Theory, Series A 35, 126 (1983) DOI
- [485]
- N. Pace and A. Sonnino, “On linear codes admitting large automorphism groups”, Designs, Codes and Cryptography 83, 115 (2016) DOI
- [486]
- R. Hill, Caps and groups, pp. 389–394 in: Proc. Rome 1973, Atti dei Convegni Lincei, 1976.
- [487]
- R. A. FISHER, “A SYSTEM OF CONFOUNDING FOR FACTORS WITH MORE THAN TWO ALTERNATIVES, GIVING COMPLETELY ORTHOGONAL CUBES AND HIGHER POWERS”, Annals of Eugenics 12, 283 (1943) DOI
- [488]
- M. C. Davey and D. J. C. MacKay, “Low density parity check codes over GF(q)”, 1998 Information Theory Workshop (Cat. No.98EX131) DOI
- [489]
- V. Pless, “Q-codes”, Journal of Combinatorial Theory, Series A 43, 258 (1986) DOI
- [490]
- J. J. Rushanan, Topics in Integral Matrices and Abelian Group Codes, California Institute of Technology, 1986 DOI
- [491]
- M. Smid, “Duadic codes (Corresp.)”, IEEE Transactions on Information Theory 33, 432 (1987) DOI
- [492]
- A. Leverrier, V. Londe, and G. Zémor, “Towards local testability for quantum coding”, Quantum 6, 661 (2022) arXiv:1911.03069 DOI
- [493]
- M. Chapman, T. Vidick, and H. Yuen, “Efficiently stable presentations from error-correcting codes”, (2023) arXiv:2311.04681
- [494]
- A. Marinoni, P. Savazzi, and R. D. Wesel, “Protograph-based q-ary LDPC codes for higher-order modulation”, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing (2010) DOI
- [495]
- D. Divsalar and L. Dolecek, “Enumerators for protograph-based ensembles of nonbinary LDPC codes”, 2011 IEEE International Symposium on Information Theory Proceedings (2011) DOI
- [496]
- K. Huang, D. G. M. Mitchell, L. Wei, X. Ma, and D. J. Costello, “Performance comparison of non-binary LDPC block and spatially coupled codes”, 2014 IEEE International Symposium on Information Theory (2014) DOI
- [497]
- L. Dolecek, D. Divsalar, Y. Sun, and B. Amiri, “Non-Binary Protograph-Based LDPC Codes: Enumerators, Analysis, and Designs”, IEEE Transactions on Information Theory 60, 3913 (2014) DOI
- [498]
- J. van Lint and F. MacWilliams, “Generalized quadratic residue codes”, IEEE Transactions on Information Theory 24, 730 (1978) DOI
- [499]
- J. H. Lint, “Generalized quadratic-residue codes”, Algebraic Coding Theory and Applications 285 (1979) DOI