2005 |
8 | EE | Ralf Koetter,
Wen-Ching W. Li,
Pascal O. Vontobel,
Judy L. Walker:
Pseudo-Codewords of Cycle Codes via Zeta Functions
CoRR abs/cs/0502033: (2005) |
7 | EE | Ralf Koetter,
Wen-Ching W. Li,
Pascal O. Vontobel,
Judy L. Walker:
Characterizations of Pseudo-Codewords of LDPC Codes
CoRR abs/cs/0508049: (2005) |
2003 |
6 | | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Applications of list decoding to tracing traitors.
IEEE Transactions on Information Theory 49(5): 1312-1318 (2003) |
2001 |
5 | EE | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Efficient Traitor Tracing Algorithms Using List Decoding.
ASIACRYPT 2001: 175-192 |
4 | | Judy L. Walker:
Constructing critical indecomposable codes.
IEEE Transactions on Information Theory 47(5): 1780-1795 (2001) |
1999 |
3 | | José Felipe Voloch,
Judy L. Walker:
Codes over rings from curves of higher genus.
IEEE Transactions on Information Theory 45(6): 1768-1776 (1999) |
1997 |
2 | | Judy L. Walker:
The Nordstrom-Robinson code is algebraic-geometric.
IEEE Transactions on Information Theory 43(5): 1588-1593 (1997) |
1996 |
1 | | Judy L. Walker:
A New Approach to the Main Conjecture on Algebraic-Geometric MDS Codes.
Des. Codes Cryptography 9(1): 115-120 (1996) |