找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe

[復制鏈接]
樓主: 帳簿
21#
發(fā)表于 2025-3-25 03:44:56 | 只看該作者
Pravinkumar B. Sehgal,Igor TammIn this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.
22#
發(fā)表于 2025-3-25 08:26:54 | 只看該作者
Magdalena Stolarska,Nicoleta TarfuleaA linear block decoding method in which decoding is reduced to the repeated decoding of shortened codes is proposed. The algorithm for constructing coverings from codewords, which are necessary for the proposed technique, is provided. A tables of such coverings for a number of binary BCH and quadratic-residue (QR) codes is presented.
23#
發(fā)表于 2025-3-25 12:43:41 | 只看該作者
Tomás A. Reader,Catherine StrazielleThe problem of reducing the number of multiplications in infinite response filtering is considered. We show how this operation may be decomposed on finite response filtrations and so-named halfconvolutions. Examples of the efficient procedures for filters of low order are presented.
24#
發(fā)表于 2025-3-25 16:49:02 | 只看該作者
25#
發(fā)表于 2025-3-25 21:17:55 | 只看該作者
,How to avoid the Sidel’nikov-Shestakov attack,Recently [2] Sidel‘nikov and Shestakov showed how to break the Niederreiter Public-Key Cryptosystem. It is proposed to make breaking this PKC based on Generalized Reed-Solomon codes more difficult by randomizing the parity check matrix. The modified Niederreiter system appears to be secure.
26#
發(fā)表于 2025-3-26 01:28:25 | 只看該作者
27#
發(fā)表于 2025-3-26 06:06:27 | 只看該作者
Codes that correct two-dimensional burst errors,Metrics are defined which describe array bursts. Spectra for these metrics, bounds for optimal codes and code constructions are discussed.
28#
發(fā)表于 2025-3-26 10:08:18 | 只看該作者
Self-checking decoding algorithm for Reed-Solomon codes,The definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.
29#
發(fā)表于 2025-3-26 14:46:31 | 只看該作者
30#
發(fā)表于 2025-3-26 17:36:32 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 21:29
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
陕西省| 阳城县| 当涂县| 三原县| 临洮县| 武山县| 津市市| 福海县| 灵石县| 沛县| 安远县| 昌吉市| 尖扎县| 丰台区| 东乡县| 金溪县| 原平市| 隆德县| 马关县| 揭东县| 洞头县| 嫩江县| 巴楚县| 崇州市| 武冈市| 木兰县| 清涧县| 汝南县| 中西区| 金堂县| 阿尔山市| 惠水县| 霍邱县| 三河市| 鄯善县| 凌海市| 石嘴山市| 玉溪市| 新津县| 奈曼旗| 仪陇县|