標(biāo)題: Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe [打印本頁] 作者: 帳簿 時間: 2025-3-21 16:06
書目名稱Error Control, Cryptology, and Speech Compression影響因子(影響力)
書目名稱Error Control, Cryptology, and Speech Compression影響因子(影響力)學(xué)科排名
書目名稱Error Control, Cryptology, and Speech Compression網(wǎng)絡(luò)公開度
書目名稱Error Control, Cryptology, and Speech Compression網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Error Control, Cryptology, and Speech Compression被引頻次
書目名稱Error Control, Cryptology, and Speech Compression被引頻次學(xué)科排名
書目名稱Error Control, Cryptology, and Speech Compression年度引用
書目名稱Error Control, Cryptology, and Speech Compression年度引用學(xué)科排名
書目名稱Error Control, Cryptology, and Speech Compression讀者反饋
書目名稱Error Control, Cryptology, and Speech Compression讀者反饋學(xué)科排名
作者: 束縛 時間: 2025-3-21 21:02 作者: Fallibility 時間: 2025-3-22 04:20
Error Control, Cryptology, and Speech Compression978-3-540-48588-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: BOOR 時間: 2025-3-22 07:13
Incubation and Separation Techniqueslication, variants of the realization of such private communication were invited. Comparing known systems, we identify three general mathematical objectives among these variants:.In this paper we consider the first objective in its simplest form: a protocol that includes only one round of information exchange.作者: 技術(shù) 時間: 2025-3-22 12:47 作者: cliche 時間: 2025-3-22 14:45 作者: cliche 時間: 2025-3-22 17:10 作者: Serenity 時間: 2025-3-22 22:17 作者: 金哥占卜者 時間: 2025-3-23 03:37
Periodicity of one-dimensional tilings,imensional case. Namely, any set of templates which permits a tiling of the set ? of integers also permits a periodic tiling. We also show that any tiling of ? by one template is necessarily periodic. The obtained results are also valid for tiling of the set IR of real numbers.作者: 疲憊的老馬 時間: 2025-3-23 09:32 作者: 一再困擾 時間: 2025-3-23 13:05
Paul L. McNeil,D. Lansing Taylorptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with 作者: antedate 時間: 2025-3-23 15:46
W. James Nelson,Elias Lazarideshly speaking, the codewords transmitted through this channel are degraded by the deletion of a number of bits and by the complementing of a number of the remaining bits. It is assumed that the channel output codewords are available to a cryptanalyst. The security of the messages is measured by the u作者: Cerebrovascular 時間: 2025-3-23 20:31 作者: 粘 時間: 2025-3-24 01:47 作者: capillaries 時間: 2025-3-24 03:58 作者: Saline 時間: 2025-3-24 09:06 作者: barium-study 時間: 2025-3-24 13:39 作者: 責(zé)任 時間: 2025-3-24 18:10
Edouard Hannezo,Colinda L. G. J. ScheeleThe definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.作者: Asparagus 時間: 2025-3-24 19:00 作者: 腐敗 時間: 2025-3-25 00:44 作者: 絆住 時間: 2025-3-25 03:44
Pravinkumar B. Sehgal,Igor TammIn this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.作者: incite 時間: 2025-3-25 08:26
Magdalena Stolarska,Nicoleta TarfuleaA linear block decoding method in which decoding is reduced to the repeated decoding of shortened codes is proposed. The algorithm for constructing coverings from codewords, which are necessary for the proposed technique, is provided. A tables of such coverings for a number of binary BCH and quadratic-residue (QR) codes is presented.作者: 同步左右 時間: 2025-3-25 12:43
Tomás A. Reader,Catherine StrazielleThe problem of reducing the number of multiplications in infinite response filtering is considered. We show how this operation may be decomposed on finite response filtrations and so-named halfconvolutions. Examples of the efficient procedures for filters of low order are presented.作者: CAMEO 時間: 2025-3-25 16:49 作者: 壯觀的游行 時間: 2025-3-25 21:17
,How to avoid the Sidel’nikov-Shestakov attack,Recently [2] Sidel‘nikov and Shestakov showed how to break the Niederreiter Public-Key Cryptosystem. It is proposed to make breaking this PKC based on Generalized Reed-Solomon codes more difficult by randomizing the parity check matrix. The modified Niederreiter system appears to be secure.作者: 小官 時間: 2025-3-26 01:28 作者: 組成 時間: 2025-3-26 06:06
Codes that correct two-dimensional burst errors,Metrics are defined which describe array bursts. Spectra for these metrics, bounds for optimal codes and code constructions are discussed.作者: Reverie 時間: 2025-3-26 10:08
Self-checking decoding algorithm for Reed-Solomon codes,The definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.作者: extemporaneous 時間: 2025-3-26 14:46 作者: 幾何學(xué)家 時間: 2025-3-26 17:36 作者: Serenity 時間: 2025-3-26 22:59
Concatenated codes with convolutional inner and outer codes,In this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.作者: Cerebrovascular 時間: 2025-3-27 05:02 作者: bromide 時間: 2025-3-27 07:58 作者: 連詞 時間: 2025-3-27 12:01 作者: 600 時間: 2025-3-27 15:43 作者: paroxysm 時間: 2025-3-27 18:12
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/314917.jpg作者: 跳脫衣舞的人 時間: 2025-3-27 22:01 作者: 殺死 時間: 2025-3-28 04:28
Susceptibility of digital signature schemes based on error-correcting codes to universal forgery,ptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with 作者: 知識分子 時間: 2025-3-28 08:09 作者: Ferritin 時間: 2025-3-28 12:58
Linear algebra approach to secret sharing schemes, performance of linear secret sharing schemes using the tools of linear algebra and coding theory. In particular, the nonexistence of an ideal threshold linear 555 for the case where the number of participants is twice as large as the number of possible values of a secret is shown.作者: 協(xié)議 時間: 2025-3-28 17:53
Periodicity of one-dimensional tilings,imensional case. Namely, any set of templates which permits a tiling of the set ? of integers also permits a periodic tiling. We also show that any tiling of ? by one template is necessarily periodic. The obtained results are also valid for tiling of the set IR of real numbers.作者: Glycogen 時間: 2025-3-28 20:09
0302-9743 he 16 thoroughly refereed papers by internationally known scientists selected for this volume offer an exciting perspective on error control coding, cryptology, and speech compression. In the former Soviet Union, research related to information protection was often shielded from the international sc作者: anticipate 時間: 2025-3-29 01:19
Paul L. McNeil,D. Lansing Taylorplied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with this attack and the earlier ones, general remarks about digital signature schemes based on linear errorcorrecting block codes are presented.作者: 侵害 時間: 2025-3-29 03:24
0302-9743 rticular interest; their work defines the cutting edge of research in many areas of error control, cryptology, and speech recognition.978-3-540-58265-6978-3-540-48588-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 剝削 時間: 2025-3-29 08:23
Susceptibility of digital signature schemes based on error-correcting codes to universal forgery,plied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with this attack and the earlier ones, general remarks about digital signature schemes based on linear errorcorrecting block codes are presented.作者: 狂熱語言 時間: 2025-3-29 15:16 作者: Bph773 時間: 2025-3-29 15:46 作者: noxious 時間: 2025-3-29 21:05 作者: CLEAR 時間: 2025-3-30 02:24 作者: 巨碩 時間: 2025-3-30 07:01
‘...Get Your Adidas Sambas and Floppy Fringes in Place!’: Twenty-First-Century Cultural Industries, Heritagisation, Generational Memory, and Britpoptablishing its own place in that canon, while its proponents and principal champions have retained roles as elder statespersons of British music and associated sectors. This chapter traces the different iterations of this trajectory, before examining the intergenerational and industrial dynamics tha作者: Medicare 時間: 2025-3-30 12:11 作者: 浪費物質(zhì) 時間: 2025-3-30 15:38 作者: GUMP 時間: 2025-3-30 20:06 作者: mercenary 時間: 2025-3-31 00:34 作者: 令人苦惱 時間: 2025-3-31 01:34
N. B. Grahamestions concerning the dividing line between science and ideology, as well as the social construction, interpretation and application of knowledge, the extent to which official statisticians were directly implicated in the racial and population policies of the Nazi regime remains unclear. According 作者: 才能 時間: 2025-3-31 06:21 作者: 自由職業(yè)者 時間: 2025-3-31 10:50
Bharat Tidke,Rupa Mehtae vor allem durch Erweiterungen über neue Werkstoffe, wie z.B. dünne Filme, metallische Gl?ser oder Nanor?hrchen Rechnung getragen. Au?erdem wurdejedes Kapitel durch übungsaufgaben mit L?sungen erweitert..978-3-642-36602-4978-3-642-36603-1Series ISSN 0937-7433 Series E-ISSN 2512-5214 作者: 冷峻 時間: 2025-3-31 14:52 作者: innate 時間: 2025-3-31 18:19
Book 2024ient dabei als Ausgangspunkt mehrerer Ableitungen und erm?glicht ein grundlegendes Verst?ndnis über die prozessualen Aufgaben im strategischen Einkauf, um die Ziele der Einkaufsorganisation zu unterstützen. Neben Lieferantenqualifikation oder Kostenmanagement werden auch Prozesse beschrieben, die er作者: 談判 時間: 2025-3-31 23:07