- Source coding, space time coding
- Detection and estimation theory
- Information and differential entropy
- Channel capacity, input-constrained channels
- Kolmogorov complexity, quantum information science
- Codes construction/existence/analysis
- Information algebra/geometry
- Non-existence results for codes, bounds for codes/designs
- Decoding algorithms
- Algebraic combinatorics
- Network coding and lattice theory
- Wireless/multimedia applications, mobile communication channels
- Computational complexity, cryptography
- Communication combinatorial problems
- Other areas of mathematics/computer science
More on this journal...
The missions of IJICoT are to improve international research on topical areas by publishing high-quality articles, and to expose the readers to the recent advances in these areas.Readership
- Professors and graduate students in mathematics, telecommunications, computer science, and electrical engineering
- Coding theorists, telecommunication researchers, engineers and managers
- General participants in networking and multimedia technologies
Information theory and its important sub-field, coding theory, play central roles in the theoretical computer science. As coding theory occupies an important position within the field of information theory, the focus of IJICoT is to lay more weight on publishing state-of-the-art research articles relating to coding theory. However, articles discussing other issues within information theory are also of interest to this journal
Coding theory contributes to the theory of error-correcting codes. Progress in most research in this area is based on algebraic, combinatorial or probabilistic approaches. IJICoT serves as a medium to report, exchange, and discuss work-in-progress, experience, trend-setting ideas on constructions/existence of codes, limitations/non-existence of codes, efficient algorithms for encoding/decoding codes, and scientific knowledge that make use of coding theory methods. In addition, practical contributions of the aforementioned theoretical approaches, such as applications to cryptography, network coding, network security, computational complexity theory, communication networks, as well as applications to other areas of mathematics and computer science are included.
Browse issuesVol. 2
IJICoT is indexed in:
IJICoT is listed in:
Editor in Chief
- Woungang, Isaac, Ryerson University, Canada
- Misra, Subhas C., IIT Kanpur, India
- Aubry, Yves, Universitť de TOULON et du VAR, France
- Aydin, Noah (Nuh), Kenyon College, USA
- Cheraghchi, Mahdi, Carnegie Mellon University, USA
- Dey, Bikash Kumar, Indian Institute of Technology-Bombay, India
- Ghorpade, Sudhir R., Indian Institute of Technology Bombay, India
- Grassl, Markus, National University of Singapore, Singapore
- Gulliver, T. Aaron, University of Victoria, Canada
- Harada, Masaaki, Yamagata University, Japan
- Kelley, Christine A., University of Nebraska-Lincoln, USA
- Kim, Jon-Lark, University of Louisville, USA
- Krishna, Garg Hari, National University of Singapore, Singapore
- Kyureghyan, Gohar, Otto-von-Guericke Universitšt Magdeburg, Germany
- Lauter, Kristin, Microsoft Research, USA
- Ma, Siu Lun, National University of Singapore, Singapore
- Misra, Sudip, Indian Institute of Technology, India
- Panario, Daniel, Carleton University, Canada
- Pusane, Ali Emre, Bogazici University, Turkey
- Rajan, B. Sundar, Indian Institute of Science, Bangalore, India
- Rashvand, Habib F., University of Warwick, UK
- Sadeghi, M.-R. Rafsanjani, Carleton University, Canada
- Sharma, Vinod, Indian Institute of Science, Bangalore, India
- Solé, Patrick, Polytech'Nice, France
- Sun, Wei, Mitsubishi Electric Research Laboratories (MERL), USA
- Uchôa-Filho, Bartolomeu F., Federal University of Santa Catarina, Brazil
A few essentials for publishing in this journal
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been completely re-written (taken to mean more than 50%) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
- All our articles are refereed through a double-blind process.
- All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors†is available.
All articles for this journal must be submitted using our online submissions system.
Read our information on preparing and submitting articles.