找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe

[復制鏈接]
樓主: 帳簿
21#
發(fā)表于 2025-3-25 03:44:56 | 只看該作者
Pravinkumar B. Sehgal,Igor TammIn this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.
22#
發(fā)表于 2025-3-25 08:26:54 | 只看該作者
Magdalena Stolarska,Nicoleta TarfuleaA linear block decoding method in which decoding is reduced to the repeated decoding of shortened codes is proposed. The algorithm for constructing coverings from codewords, which are necessary for the proposed technique, is provided. A tables of such coverings for a number of binary BCH and quadratic-residue (QR) codes is presented.
23#
發(fā)表于 2025-3-25 12:43:41 | 只看該作者
Tomás A. Reader,Catherine StrazielleThe problem of reducing the number of multiplications in infinite response filtering is considered. We show how this operation may be decomposed on finite response filtrations and so-named halfconvolutions. Examples of the efficient procedures for filters of low order are presented.
24#
發(fā)表于 2025-3-25 16:49:02 | 只看該作者
25#
發(fā)表于 2025-3-25 21:17:55 | 只看該作者
,How to avoid the Sidel’nikov-Shestakov attack,Recently [2] Sidel‘nikov and Shestakov showed how to break the Niederreiter Public-Key Cryptosystem. It is proposed to make breaking this PKC based on Generalized Reed-Solomon codes more difficult by randomizing the parity check matrix. The modified Niederreiter system appears to be secure.
26#
發(fā)表于 2025-3-26 01:28:25 | 只看該作者
27#
發(fā)表于 2025-3-26 06:06:27 | 只看該作者
Codes that correct two-dimensional burst errors,Metrics are defined which describe array bursts. Spectra for these metrics, bounds for optimal codes and code constructions are discussed.
28#
發(fā)表于 2025-3-26 10:08:18 | 只看該作者
Self-checking decoding algorithm for Reed-Solomon codes,The definitions of error secure and self-checking algorithms are given. It is shown that decoding algorithms for Reed-Solomon codes over . can be transformed in self-checking algorithms for a set . of single algorithmic errors. The two kinds of check functions of error secure decoding algorithms of Reed-Solomon codes are described.
29#
發(fā)表于 2025-3-26 14:46:31 | 只看該作者
30#
發(fā)表于 2025-3-26 17:36:32 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 21:29
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
右玉县| 岳池县| 铁岭县| 南漳县| 七台河市| 汾阳市| 贵溪市| 武安市| 扎鲁特旗| 克什克腾旗| 类乌齐县| 北碚区| 禄丰县| 黄浦区| 五指山市| 安福县| 抚宁县| 泸定县| 阿荣旗| 乌兰县| 从江县| 介休市| 滨州市| 肇源县| 辽中县| 桂东县| 巴楚县| 涞源县| 泸定县| 竹北市| 讷河市| 桂阳县| 临夏市| 天等县| 德安县| 巩义市| 武威市| 曲松县| 开平市| 大石桥市| 永定县|