Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On numerical semigroups and the redundancy of improved codes correcting generic errors.. Des. Codes Cryptogr., 53 (2): 111-118 (2009)General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model., , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2506-2517 (2021)Quasi-Ordinarization Transform of a Numerical Semigroup., , and . Symmetry, 13 (6): 1084 (2021)On Semigroups Generated by Two Consecutive Integers and Improved Hermitian Codes, and . CoRR, (2006)The Order Bound on the Minimum Distance of the One-Point Codes Associated to a Garcia-Stichtenoth Tower of Function Fields, and . CoRR, (2006)Bounds on the Number of Numerical Semigroups of a Given Genus. CoRR, (2008)Duality for Several Families of Evaluation Codes, and . CoRR, (2006)BISK Scheme Applied to Sign Encoding and to Magnitude Refinement., , , , and . ACIVS, volume 3708 of Lecture Notes in Computer Science, page 442-451. Springer, (2005)Still Image Compression Through Exhaustive Two-Valued Shape-Adaptive Searches., , , , and . DCC, page 441. IEEE Computer Society, (2006)A bibliometric index based on the collaboration distance between cited and citing authors., , and . J. Informetrics, 5 (2): 248-264 (2011)