咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 3 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
  • 6 篇 理学
    • 6 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 15 篇 residue code
  • 4 篇 torsion code
  • 3 篇 cyclic code
  • 2 篇 linear code
  • 2 篇 generating idemp...
  • 1 篇 fault missing ra...
  • 1 篇 time redundancy
  • 1 篇 device densities
  • 1 篇 relative chain c...
  • 1 篇 weak plotkin bou...
  • 1 篇 weight hierarchy
  • 1 篇 almost-mdr code
  • 1 篇 (4)-code
  • 1 篇 notch filter
  • 1 篇 coarse-grained r...
  • 1 篇 asymptotic singl...
  • 1 篇 on-line error de...
  • 1 篇 near-mdr code
  • 1 篇 extremal & zopf
  • 1 篇 fault tolerance

机构

  • 1 篇 tima lab grenobl...
  • 1 篇 politecn milan d...
  • 1 篇 college of infor...
  • 1 篇 school of mathem...
  • 1 篇 southwest jiaoto...
  • 1 篇 islamic azad uni...
  • 1 篇 school of mathem...
  • 1 篇 dalian univ coll...
  • 1 篇 univ rijeka fac ...
  • 1 篇 school of mathem...
  • 1 篇 amirkabir univ t...
  • 1 篇 univ lorraine um...
  • 1 篇 chinese acad sci...
  • 1 篇 chalmers univ te...
  • 1 篇 department of el...
  • 1 篇 department of ma...
  • 1 篇 wireless and mob...
  • 1 篇 japan sci & tech...
  • 1 篇 indian inst tech...
  • 1 篇 naval postgradua...

作者

  • 1 篇 breveglieri luca
  • 1 篇 sentieys o.
  • 1 篇 zhang xiaoyan
  • 1 篇 wang jing
  • 1 篇 huang jia
  • 1 篇 wang lingrong
  • 1 篇 zhu shixin
  • 1 篇 feng qianqian
  • 1 篇 zhang keke
  • 1 篇 zhao ming
  • 1 篇 chester eg
  • 1 篇 sayers il
  • 1 篇 kinniment dj
  • 1 篇 xue-dong dong
  • 1 篇 maistri paolo
  • 1 篇 john ernest laws...
  • 1 篇 zhuang zhuojun
  • 1 篇 martinovic sara ...
  • 1 篇 rahbar afsaneh
  • 1 篇 koren israel

语言

  • 13 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Residue code"
15 条 记 录,以下是1-10 订阅
排序:
Implementation of residue code as a design for testability strategy using GENESIL Silicon Compiler
Implementation of residue code as a design for testability s...
收藏 引用
作者: John Ernest Lawson Naval Postgraduate School
学位级别:硕士
This thesis describes the need for including design for testability in a VLSI chip design and provides information on implementing a DFT strategy using the GENESIL Silicon Compiler. Two structured techniques of design... 详细信息
来源: 评论
On the residue codes of extremal Type II Z4-codes of lengths 32 and 40
收藏 引用
DISCRETE MATHEMATICS 2011年 第20期311卷 2148-2157页
作者: Harada, Masaaki Yamagata Univ Dept Math Sci Yamagata 9908560 Japan Japan Sci & Technol Agcy PRESTO Kawaguchi Saitama 3320012 Japan
In this paper, we determine the dimensions of the residue codes of extremal Type II Z(4)-codes of of lengths 32 and 40. We demonstrate that every binary doubly even self-dual code of length 32 can be realized as the r... 详细信息
来源: 评论
Generating idempotents of quartic residue codes over the field F4
Generating idempotents of quartic residue codes over the fie...
收藏 引用
International Forum on Computer and Information Technology (IFCIT)
作者: Dong, Xuedong Dalian Univ Coll Informat Engn Dalian 116622 Peoples R China
The generating polynomials of higher power residue codes over finite fields are difficult to construct. This paper gives explicit expressions of generating idempotents of quartic residue codes over the field F-4. The ... 详细信息
来源: 评论
DESIGN OF A RELIABLE AND SELF-TESTING VLSI DATAPATH USING residue CODING TECHNIQUES
收藏 引用
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES 1986年 第3期133卷 169-179页
作者: SAYERS, IL KINNIMENT, DJ CHESTER, EG Department of Electrical & Electronic Engineering University of Newcastle upon Tyne Newcastle upon Tyne UK
The testing of VLSI circuits is becoming progressively more difficult as device densities increase. This has brought about several proposals for designing VLSI circuits with testability built in. A method is presented... 详细信息
来源: 评论
An operation-centered approach to fault detection in symmetric cryptography ciphers
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2007年 第5期56卷 635-649页
作者: Breveglieri, Luca Koren, Israel Maistri, Paolo Politecn Milan Dept Elect & Informat Technol I-20133 Milan Italy Univ Massachusetts Dept Elect & Comp Engn Amherst MA 01003 USA TIMA Lab Grenoble France
One of the most effective ways of attacking a cryptographic device is by deliberate fault injection during computation, which allows retrieving the secret key with a small number of attempts. Several attacks on symmet... 详细信息
来源: 评论
New extremal Type II ℤ4-codes of length 64
收藏 引用
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 2024年 1-14页
作者: Martinovic, Sara Ban Rukavina, Sanja Univ Rijeka Fac Math Rijeka 51000 Croatia
Type II & Zopf;(4)-codes are a class of self-dual & Zopf;(4)-codes with Euclidean weights divisible by eight. A Type II & Zopf;(4)-code of length n is extremal if its minimum Euclidean weight is equal to 8... 详细信息
来源: 评论
Bounds on relative generalised Hamming weight
收藏 引用
IET COMMUNICATIONS 2020年 第11期14卷 1794-1804页
作者: Zhuang, Zhuojun Zhang, Keke Jing, Zhen Dai, Bin Huang, Jia Chinese Acad Sci Innovat Acad Microsatellites 99 Haike Rd Shanghai 201203 Peoples R China Southwest Jiaotong Univ Sch Informat Sci & Technol 111First SectNorth Second Ring Rd Chengdu 610031 Sichuan Peoples R China
The rth relative generalised Hamming weight (RGHW) of an [n, k] linear code C and an [n, k(1)] subcode C-1, a generalisation of generalised Hamming weight (GHW), characterises code performances of wiretap channel of t... 详细信息
来源: 评论
Design of the coarse-grained reconfigurable architecture DART with on-line error detection
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2014年 第2期38卷 124-136页
作者: Jafri, S. M. A. H. Piestrak, S. J. Sentieys, O. Pillement, S. Royal Inst Technol KTH Elect Syst Lab SE-10044 Stockholm Sweden Univ Lorraine UMR CNRS 7198 Inst Jean Lamour F-54506 Vandoeuvre Les Nancy France Univ Rennes 1 CAIRN Res Team IRISA INRIA F-22300 Lannion France Univ Nantes Ecole Polytech Dept Elect & Technol Numer F-44306 Nantes France
This paper presents the implementation of the coarse-grained reconfigurable architecture (CGRA) DART with on-line error detection intended for increasing fault-tolerance. Most parts of the data paths and of the local ... 详细信息
来源: 评论
Generating Idempotents of Sixth residue codes over the Binary Field
Generating Idempotents of Sixth Residue Codes over the Binar...
收藏 引用
2017 2nd International Conference on Computer, Network Security and Communication Engineering(CNSCE2017)
作者: Xue-dong DONG Yan ZHANG College of Information Engineering Dalian University School of Mathematics Liaoning Normal University
Higher power residue codes over finite fields are generated by factors of the polynomial x~n-1. Unfortunately, to decompose the polynomial x~n-1 over finite fields is difficult. Generating idempotents can also generat... 详细信息
来源: 评论
A high-level synthesis based dual-module redundancy with multi-residue detection(DMR-MRD)fault-tolerant method for on-board processing satellite communication systems
收藏 引用
High Technology Letters 2014年 第3期20卷 245-252页
作者: 杨文慧 Chen Xiang Wang Yu Zhao Ming Wang Jing Communication Engineering of Xiamen University Aerosapce Center Tsinghua University Department of Electronic Engineering Tsinghua University Wireless and Mobile Communication Technology R&D Center Tsinghua University
On board processing(OBP) satellite systems have obtained more and more attentions in recent years because of their high efficiency and ***,the OBP transponders are very sensitive to the high energy particles in the sp... 详细信息
来源: 评论