找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe

[復(fù)制鏈接]
樓主: 帳簿
21#
發(fā)表于 2025-3-25 03:44:56 | 只看該作者
Pravinkumar B. Sehgal,Igor TammIn this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.
22#
發(fā)表于 2025-3-25 08:26:54 | 只看該作者
Magdalena Stolarska,Nicoleta TarfuleaA linear block decoding method in which decoding is reduced to the repeated decoding of shortened codes is proposed. The algorithm for constructing coverings from codewords, which are necessary for the proposed technique, is provided. A tables of such coverings for a number of binary BCH and quadratic-residue (QR) codes is presented.
23#
發(fā)表于 2025-3-25 12:43:41 | 只看該作者
Tomás A. Reader,Catherine StrazielleThe problem of reducing the number of multiplications in infinite response filtering is considered. We show how this operation may be decomposed on finite response filtrations and so-named halfconvolutions. Examples of the efficient procedures for filters of low order are presented.
24#
發(fā)表于 2025-3-25 16:49:02 | 只看該作者
25#
發(fā)表于 2025-3-25 21:17:55 | 只看該作者
,How to avoid the Sidel’nikov-Shestakov attack,Recently [2] Sidel‘nikov and Shestakov showed how to break the Niederreiter Public-Key Cryptosystem. It is proposed to make breaking this PKC based on Generalized Reed-Solomon codes more difficult by randomizing the parity check matrix. The modified Niederreiter system appears to be secure.
26#
發(fā)表于 2025-3-26 01:28:25 | 只看該作者
27#
發(fā)表于 2025-3-26 06:06:27 | 只看該作者
Codes that correct two-dimensional burst errors,Metrics are defined which describe array bursts. Spectra for these metrics, bounds for optimal codes and code constructions are discussed.
28#
發(fā)表于 2025-3-26 10:08:18 | 只看該作者
Self-checking decoding algorithm for Reed-Solomon codes,The definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.
29#
發(fā)表于 2025-3-26 14:46:31 | 只看該作者
30#
發(fā)表于 2025-3-26 17:36:32 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 18:37
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
禄丰县| 微博| 吉木萨尔县| 福泉市| 吉木萨尔县| 苏州市| 淮北市| 武川县| 宜章县| 金山区| 星子县| 安化县| 河南省| 尤溪县| 舟山市| 大庆市| 大同县| 盘锦市| 葫芦岛市| 梨树县| 肃南| 平昌县| 大姚县| 常宁市| 九台市| 宜阳县| 花莲县| 林甸县| 右玉县| 武平县| 南雄市| 方城县| 油尖旺区| 韶山市| 泸西县| 呼和浩特市| 陆丰市| 涞源县| 浦江县| 黄浦区| 郴州市|