找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe

[復制鏈接]
樓主: 帳簿
21#
發(fā)表于 2025-3-25 03:44:56 | 只看該作者
Pravinkumar B. Sehgal,Igor TammIn this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.
22#
發(fā)表于 2025-3-25 08:26:54 | 只看該作者
Magdalena Stolarska,Nicoleta TarfuleaA linear block decoding method in which decoding is reduced to the repeated decoding of shortened codes is proposed. The algorithm for constructing coverings from codewords, which are necessary for the proposed technique, is provided. A tables of such coverings for a number of binary BCH and quadratic-residue (QR) codes is presented.
23#
發(fā)表于 2025-3-25 12:43:41 | 只看該作者
Tomás A. Reader,Catherine StrazielleThe problem of reducing the number of multiplications in infinite response filtering is considered. We show how this operation may be decomposed on finite response filtrations and so-named halfconvolutions. Examples of the efficient procedures for filters of low order are presented.
24#
發(fā)表于 2025-3-25 16:49:02 | 只看該作者
25#
發(fā)表于 2025-3-25 21:17:55 | 只看該作者
,How to avoid the Sidel’nikov-Shestakov attack,Recently [2] Sidel‘nikov and Shestakov showed how to break the Niederreiter Public-Key Cryptosystem. It is proposed to make breaking this PKC based on Generalized Reed-Solomon codes more difficult by randomizing the parity check matrix. The modified Niederreiter system appears to be secure.
26#
發(fā)表于 2025-3-26 01:28:25 | 只看該作者
27#
發(fā)表于 2025-3-26 06:06:27 | 只看該作者
Codes that correct two-dimensional burst errors,Metrics are defined which describe array bursts. Spectra for these metrics, bounds for optimal codes and code constructions are discussed.
28#
發(fā)表于 2025-3-26 10:08:18 | 只看該作者
Self-checking decoding algorithm for Reed-Solomon codes,The definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.
29#
發(fā)表于 2025-3-26 14:46:31 | 只看該作者
30#
發(fā)表于 2025-3-26 17:36:32 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 21:29
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
汽车| 衡阳市| 肥乡县| 辽宁省| 西城区| 黄冈市| 博客| 安泽县| 元阳县| 孝昌县| 惠来县| 崇义县| 固阳县| 隆德县| 齐河县| 连州市| 延寿县| 商城县| 永春县| 五台县| 宜君县| 大同县| 武宁县| 临澧县| 嘉禾县| 阳新县| 新津县| 富顺县| 阳东县| 宁陕县| 温宿县| 永年县| 彩票| 霍邱县| 进贤县| 六枝特区| 阿瓦提县| 车险| 察哈| 尖扎县| 高尔夫|