咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 11 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 9 篇 理学
    • 7 篇 数学
    • 1 篇 生物学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 21 篇 algebraic coding
  • 8 篇 network coding
  • 5 篇 multicast
  • 3 篇 information theo...
  • 3 篇 security
  • 3 篇 cryptography
  • 2 篇 secret sharing
  • 2 篇 94b60
  • 2 篇 error correction
  • 2 篇 singleton bound
  • 2 篇 94a05
  • 2 篇 encryption
  • 2 篇 wiretap channel
  • 2 篇 algebraic codes
  • 1 篇 distributive lin...
  • 1 篇 asynchronous coo...
  • 1 篇 basis of divisor...
  • 1 篇 reed-solomon cod...
  • 1 篇 random coding
  • 1 篇 wiretap-ping att...

机构

  • 2 篇 chinese univ hon...
  • 1 篇 school of teleco...
  • 1 篇 school of inform...
  • 1 篇 inst adv studies...
  • 1 篇 li cor inc linco...
  • 1 篇 boston univ ece ...
  • 1 篇 mit informat & d...
  • 1 篇 russian acad sci...
  • 1 篇 beijing univ pos...
  • 1 篇 mit dept elect e...
  • 1 篇 carnegie mellon ...
  • 1 篇 univ illinois co...
  • 1 篇 vit univ sch adv...
  • 1 篇 chinese univ hon...
  • 1 篇 osaka gakuin uni...
  • 1 篇 tsing hua univ d...
  • 1 篇 siemens ag techn...
  • 1 篇 research centre ...
  • 1 篇 yale univ dept e...
  • 1 篇 state univ mosco...

作者

  • 2 篇 liu guangjun
  • 2 篇 ning cai
  • 2 篇 raymond w. yeung
  • 2 篇 yeung raymond w.
  • 2 篇 liu ximeng
  • 1 篇 gabidulin ernst ...
  • 1 篇 rabaey j.
  • 1 篇 zhang zhixue
  • 1 篇 pilipchuk nina i...
  • 1 篇 medard muriel
  • 1 篇 vanetten jl
  • 1 篇 médard m
  • 1 篇 steffens dl
  • 1 篇 liu binyue
  • 1 篇 guo xiaoyong
  • 1 篇 erez elona
  • 1 篇 afanassiev valen...
  • 1 篇 ngai chi-kin
  • 1 篇 fan py
  • 1 篇 ishwar p.

语言

  • 21 篇 英文
检索条件"主题词=algebraic coding"
21 条 记 录,以下是11-20 订阅
排序:
Explicit Subspace Designs
Explicit Subspace Designs
收藏 引用
IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS)
作者: Guruswami, Venkatesan Kopparty, Swastik Carnegie Mellon Univ Dept Comp Sci Pittsburg KS USA Rutgers State Univ Dept Math & Comp Sci Piscataway NJ USA
A subspace design is a collection {H-1, H-2,..., H-M} of subspaces of F-q(m) with the property that no low-dimensional subspace W of F-q(m) intersects too many subspaces of the collection. Subspace designs were introd... 详细信息
来源: 评论
Fundamental bounds on power reduction during data-retention in standby SRAM
Fundamental bounds on power reduction during data-retention ...
收藏 引用
IEEE International Symposium on Circuits and Systems
作者: Kumar, A. Qin, H. Ishwar, P. Rabaey, J. Ramchandran, K. Univ Calif Berkeley EECS Berkeley CA 94720 USA Boston Univ ECE Boston MA 02215 USA
We study leakage-power reduction in standby random access memories (SRAMs) during data-retention. An SRAM cell requires a minimum critical supply voltage (DRV) above which it preserves the stored-bit reliably. Due to ... 详细信息
来源: 评论
Bounds on Cardinality of Multicomponent Network Codes  14
Bounds on Cardinality of Multicomponent Network Codes
收藏 引用
XIV Int Symposium Problems Redundancy Inform Control Syst
作者: Afanassiev, Valentin B. Gabidulin, Ernst M. Pilipchuk, Nina I. Russian Acad Sci Inst Informat Transmiss Problems Moscow Russia State Univ Moscow Inst Phys & Technol Dolgoprudnyi Russia
Network coding is a new direction of communications and information theory. algebraic coding in this area is based on Grassmann metric known also as subspace metric. The paper is devoted to some bounds on cardinality ... 详细信息
来源: 评论
Private-key cryptosystem for CD and DVD
Private-key cryptosystem for CD and DVD
收藏 引用
Conference on Mathematics of Data/Image coding, Compression, and Encryption
作者: Jiawook, RN Obducat AB S-20125 Malmo Sweden
Symmetric code cryptosystems are particularly suitable when large data sets have to be transmitted or stored at high rate. The existing algebraic code based cryptosystems are time consuming and the encoding/decoding s... 详细信息
来源: 评论
Efficient Reduction Algorithms for Special Gaussian Integer Moduli  29
Efficient Reduction Algorithms for Special Gaussian Integer ...
收藏 引用
29th IEEE Symposium on Computer Arithmetic (ARITH)
作者: Safieh, Malek De Santis, Fabrizio Siemens AG Technol Munich Germany
Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. When Gaussian integers are equipped with modulo operations, they form Gaussian integer rings or fields, depending on the... 详细信息
来源: 评论
A Lightweight Secure Network coding Scheme against Wiretapping
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第2期19卷 156-160页
作者: LIU Guangjun LIU Ximeng XIONG Jinbo ZHOU Hang School of Mathematics and Computer Engineering Xi'an University of Arts and Science School of Telecommunication Engineering Xidian University School of Software Fujian Normal University School of Science Engineering University of the ChinesePeople's Armed Police Force
Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks... 详细信息
来源: 评论
Network Error Correction, II: Lower Bounds
收藏 引用
Communications in Information & Systems 2006年 第1期6卷 37-54页
作者: Ning Cai Raymond W. Yeung
In Part I of this paper, we introduced the paradigm of network error correction as a generalization of classical link-by-link error correction. We also obtained the network generalizations of the Hamming bound and the... 详细信息
来源: 评论
Network Error Correction, I: Basic Concepts and Upper Bounds
收藏 引用
Communications in Information & Systems 2006年 第1期6卷 19-35页
作者: Raymond W. Yeung Ning Cai
Error correction in existing point-to-point communication networks is done on a link-by-link basis, which is referred to in this paper as classical error correction . Inspired by network coding, we introduce in this t... 详细信息
来源: 评论
SEQUENCING 2 DNA TEMPLATES IN 5 CHANNELS BY DIGITAL COMPRESSION
收藏 引用
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA 1993年 第5期90卷 1647-1651页
作者: NELSON, M ZHANG, YP STEFFENS, DL GRABHERR, R VANETTEN, JL UNIV NEBRASKA DEPT PLANT PATHOL LINCOLN NE 68583 USA LI COR INC LINCOLN NE 68504 USA
By applying algebraic coding methods to the Sanger dideoxynucleotide procedure, DNA sequences of two templates can be determined simultaneously in only five reactions and data channels. A 5:2 data compression is accom... 详细信息
来源: 评论
Low-complexity Secure Network coding Against Wiretapping Using Intra-/Inter-generation coding
Low-complexity Secure Network Coding Against Wiretapping Usi...
收藏 引用
第八届中国可信计算与信息安全学术会议
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational *** order to reduce the security overhead of the existing solutions for secur... 详细信息
来源: 评论