找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe

[復制鏈接]
樓主: 帳簿
21#
發(fā)表于 2025-3-25 03:44:56 | 只看該作者
Pravinkumar B. Sehgal,Igor TammIn this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.
22#
發(fā)表于 2025-3-25 08:26:54 | 只看該作者
Magdalena Stolarska,Nicoleta TarfuleaA linear block decoding method in which decoding is reduced to the repeated decoding of shortened codes is proposed. The algorithm for constructing coverings from codewords, which are necessary for the proposed technique, is provided. A tables of such coverings for a number of binary BCH and quadratic-residue (QR) codes is presented.
23#
發(fā)表于 2025-3-25 12:43:41 | 只看該作者
Tomás A. Reader,Catherine StrazielleThe problem of reducing the number of multiplications in infinite response filtering is considered. We show how this operation may be decomposed on finite response filtrations and so-named halfconvolutions. Examples of the efficient procedures for filters of low order are presented.
24#
發(fā)表于 2025-3-25 16:49:02 | 只看該作者
25#
發(fā)表于 2025-3-25 21:17:55 | 只看該作者
,How to avoid the Sidel’nikov-Shestakov attack,Recently [2] Sidel‘nikov and Shestakov showed how to break the Niederreiter Public-Key Cryptosystem. It is proposed to make breaking this PKC based on Generalized Reed-Solomon codes more difficult by randomizing the parity check matrix. The modified Niederreiter system appears to be secure.
26#
發(fā)表于 2025-3-26 01:28:25 | 只看該作者
27#
發(fā)表于 2025-3-26 06:06:27 | 只看該作者
Codes that correct two-dimensional burst errors,Metrics are defined which describe array bursts. Spectra for these metrics, bounds for optimal codes and code constructions are discussed.
28#
發(fā)表于 2025-3-26 10:08:18 | 只看該作者
Self-checking decoding algorithm for Reed-Solomon codes,The definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.
29#
發(fā)表于 2025-3-26 14:46:31 | 只看該作者
30#
發(fā)表于 2025-3-26 17:36:32 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 21:29
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
花莲市| 太康县| 安远县| 高唐县| 太保市| 浪卡子县| 六枝特区| 唐海县| 太湖县| 乐陵市| 邹平县| 交城县| 施秉县| 淅川县| 杭州市| 临漳县| 三都| 广德县| 靖远县| 弥勒县| 如皋市| 理塘县| 铜梁县| 洛宁县| 和政县| 樟树市| 台北市| 应城市| 达拉特旗| 高雄市| 保定市| 富民县| 大名县| 鸡东县| 长寿区| 彰化市| 垣曲县| 原阳县| 若羌县| 四会市| 安多县|