咨询与建议

限定检索结果

文献类型

  • 39 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 28 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 8 篇 软件工程
    • 4 篇 信息与通信工程
    • 2 篇 化学工程与技术
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 11 篇 理学
    • 6 篇 数学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 1 篇 农学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 40 篇 superimposed cod...
  • 8 篇 information retr...
  • 7 篇 signature file
  • 5 篇 text retrieval
  • 4 篇 performance
  • 3 篇 document retriev...
  • 3 篇 hashing
  • 3 篇 design
  • 3 篇 performance eval...
  • 3 篇 access method
  • 2 篇 reconfigurable i...
  • 2 篇 signature files
  • 2 篇 natural language...
  • 2 篇 integrated sensi...
  • 2 篇 text searching
  • 2 篇 algorithms
  • 2 篇 peekaboo
  • 2 篇 information theo...
  • 2 篇 information comp...
  • 2 篇 bayesian learnin...

机构

  • 2 篇 univ maryland in...
  • 1 篇 univ n carolina ...
  • 1 篇 inst educ techno...
  • 1 篇 univ roma tor ve...
  • 1 篇 univ western ont...
  • 1 篇 univ melbourne d...
  • 1 篇 univ duisburg es...
  • 1 篇 technology innov...
  • 1 篇 zhejiang univ ha...
  • 1 篇 univ wollongong ...
  • 1 篇 union carbide co...
  • 1 篇 kist
  • 1 篇 univ so calif de...
  • 1 篇 ras kharkevich i...
  • 1 篇 college of infor...
  • 1 篇 stanford univ de...
  • 1 篇 max planck inst ...
  • 1 篇 hungarian acad s...
  • 1 篇 guangxi univ gua...
  • 1 篇 robert bosch gmb...

作者

  • 3 篇 faloutsos c
  • 3 篇 lee dl
  • 2 篇 yuen chau
  • 2 篇 zhong caijun
  • 2 篇 gan xu
  • 2 篇 debbah merouane
  • 2 篇 ciaccia p
  • 2 篇 yang zhaohui
  • 2 篇 huang chongwen
  • 2 篇 guo qinghua
  • 2 篇 chang cc
  • 2 篇 chen xiaoming
  • 2 篇 zezula p
  • 2 篇 zhang zhaoyang
  • 1 篇 ullmann julian r...
  • 1 篇 hell stefan w.
  • 1 篇 zhang gaoyuan
  • 1 篇 sung sy
  • 1 篇 grotjohann tim
  • 1 篇 hsu wj

语言

  • 37 篇 英文
  • 3 篇 其他
检索条件"主题词=SUPERIMPOSED coding"
40 条 记 录,以下是1-10 订阅
排序:
Quantum Learning Based Nonrandom superimposed coding for Secure Wireless Access in 5G URLLC
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 2429-2444页
作者: Xu, Dongyang Ren, Pinyi Xi An Jiao Tong Univ Sch Informat & Commun Engn Xian 710049 Peoples R China Xi An Jiao Tong Univ Shaanxi Smart Networks & Ubiquitous Access Res Ct Xian 710049 Peoples R China
Secure wireless access in ultra-reliable low-latency communications (URLLC), which is a critical aspect of 5G security, has become increasingly important due to its potential support of grant-free configuration. In gr... 详细信息
来源: 评论
Comparison of signature file models with superimposed coding
收藏 引用
INFORMATION PROCESSING LETTERS 1998年 第2期65卷 101-106页
作者: Dervos, D Manolopoulos, Y Linardis, P Aristotelian Univ Salonika Dept Informat GR-54006 Salonika Greece Inst Educ Technol Dept Informat Salonika 54101 Greece
The current study considers the superimposed coding variation of the signature file method (SC-SF). A number of issues which are not clearly specified in the literature are addressed by adopting a unified approach whi... 详细信息
来源: 评论
Generalised hough accumulator space compactification by superimposed coding
收藏 引用
Pattern Recognition Letters 1990年 第5期11卷 321-329页
作者: Ullmann, Julian R. Department of Computing King's College London Strand London WC2R 2LS United Kingdom
For recognising shifted and rotated images we use a small number, b, of n×n×n Hough accumulator spaces instead of a single N×N×N space, such that bn33. The projection from the N3 space to n3 spaces... 详细信息
来源: 评论
MULTIKEY ACCESS METHODS BASED ON superimposed coding TECHNIQUES
收藏 引用
ACM TRANSACTIONS ON DATABASE SYSTEMS 1987年 第4期12卷 655-696页
作者: SACKSDAVIS, R KENT, A RAMAMOHANARAO, K UNIV MELBOURNE DEPT COMP SCIPARKVILLEVIC 3052AUSTRALIA
Both single-level and two-level indexed descriptor schemes for multikey retrieval are presented and compared. The descriptors are formed using superimposed coding techniques and stored using a bit-inversion technique.... 详细信息
来源: 评论
FRAME-SLICED SIGNATURE FILES
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 1992年 第3期4卷 281-289页
作者: LIN, Z FALOUTSOS, C UNIV MARYLAND INST ADV COMP STUDIESCOLLEGE PKMD 20742
A new superimposed coding method, frame-sliced signature file, is proposed. Performance of this method is studied and compared with other signature file methods. The response time of the new method is improved due to ... 详细信息
来源: 评论
Bayesian Learning for Double-RIS Aided ISAC Systems With superimposed Pilots and Data
收藏 引用
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING 2024年 第5期18卷 766-781页
作者: Gan, Xu Huang, Chongwen Yang, Zhaohui Zhong, Caijun Chen, Xiaoming Zhang, Zhaoyang Guo, Qinghua Yuen, Chau Debbah, Merouane Zhejiang Univ Hangzhou Coll Informat Sci & Elect Engn Hangzhou 310027 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Zhejiang Prov Key Lab Info Proc Commun & Netw IPCA Hangzhou 310027 Peoples R China Univ Wollongong Sch Elect Comp & Telecommun Engn Wollongong NSW 2522 Australia Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore Khalifa Univ Sci & Technol KU Res Ctr 6G Abu Dhabi 127788 U Arab Emirates Univ Paris Saclay Cent Supelec F-91192 Gif Sur Yvette France
Reconfigurable intelligent surface (RIS) has great potential to improve the performance of integrated sensing and communication (ISAC) systems, especially in scenarios where line-of-sight paths between the base statio... 详细信息
来源: 评论
Distributed associative memories for high-speed symbolic reasoning
收藏 引用
FUZZY SETS AND SYSTEMS 1996年 第2期82卷 223-233页
作者: Austin, J Department of Computer Science Advanced Computer Architecture Group University of York York YO1 5DD UK
This paper briefly introduces a novel symbolic reasoning system based upon distributed associative memories which are constructed from correlation matrix memories (CMM). The system is aimed at high-speed rule-based sy... 详细信息
来源: 评论
Asymptotic bounds for the rate of colored superimposed codes
收藏 引用
PROBLEMS OF INFORMATION TRANSMISSION 2008年 第2期44卷 112-118页
作者: Lebedev, V. S. RAS Kharkevich Inst Informat Transmiss Problems Moscow 117901 Russia
We introduce the notion of a q-ary (r (0), r (1), ..., r (q-1)) superimposed code. We obtain upper and lower asymptotic bounds for the rate of these (colored) codes.
来源: 评论
A two-level signature file based on a block-oriented data model for spatial match retrieval
收藏 引用
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS 1998年 第4期21卷 467-478页
作者: Chang, CC Lee, CF Natl Chung Cheng Univ Dept Comp Sci & Informat Engn Chiayi 621 Taiwan
Signature file methods have good retrieval properties and require little storage overhead. Applying a signature file method to the retrieval of images from iconic image databases can reduce the number of blocks to be ... 详细信息
来源: 评论
Distributed broadcast in radio networks of unknown topology
收藏 引用
THEORETICAL COMPUTER SCIENCE 2003年 第1-3期302卷 337-364页
作者: Clementi, AEF Monti, A Silvestri, R Univ Roma Tor Vergata Dipartimento Matemat I-00133 Rome Italy Univ Roma La Sapienza Dipartimento Informat Rome Italy
A multi-hop synchronous radio network is said to be unknown if the nodes have no knowledge of the topology. A basic task in radio network is that of broadcasting a message (created by a fixed source node) to all nodes... 详细信息
来源: 评论