咨询与建议

限定检索结果

文献类型

  • 1,039 册 图书
  • 26 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 1,070 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 30 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
  • 17 篇 理学
    • 17 篇 数学
    • 2 篇 系统科学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 1,070 篇 coding and infor...
  • 381 篇 cryptology
  • 349 篇 computer communi...
  • 208 篇 systems and data...
  • 176 篇 artificial intel...
  • 170 篇 information syst...
  • 155 篇 algorithm analys...
  • 150 篇 computer systems...
  • 116 篇 data structures ...
  • 102 篇 discrete mathema...
  • 86 篇 communications e...
  • 84 篇 software enginee...
  • 81 篇 theory of comput...
  • 81 篇 computer applica...
  • 74 篇 management of co...
  • 65 篇 computer system ...
  • 64 篇 computers and so...
  • 64 篇 special purpose ...
  • 60 篇 e-commerce/e-bus...
  • 60 篇 user interfaces ...

机构

  • 16 篇 swansea universi...
  • 13 篇 university of ag...
  • 11 篇 university of wa...
  • 11 篇 delft university...
  • 11 篇 nanyang technolo...
  • 11 篇 boston universit...
  • 10 篇 tsinghua univers...
  • 9 篇 chinese academy ...
  • 8 篇 shanghai jiao to...
  • 8 篇 university of tu...
  • 8 篇 banaras hindu un...
  • 8 篇 abv-indian insti...
  • 8 篇 indian institute...
  • 7 篇 university of ma...
  • 7 篇 kingdee internat...
  • 7 篇 university of wa...
  • 6 篇 cranfield univer...
  • 6 篇 coventry univers...
  • 6 篇 zf friedrichshaf...
  • 6 篇 danube universit...

作者

  • 15 篇 yogesh k. dwived...
  • 14 篇 dongdai lin
  • 11 篇 moti yung
  • 10 篇 leonid reyzin
  • 10 篇 liang-jie zhang
  • 10 篇 douglas stebila
  • 9 篇 friedrich l. bau...
  • 9 篇 marijn janssen
  • 8 篇 anshul verma
  • 8 篇 matti mäntymäki
  • 8 篇 peter parycek
  • 8 篇 gregor von ciemi...
  • 8 篇 kiran kumar patt...
  • 8 篇 pradeepika verma
  • 7 篇 tsuyoshi takagi
  • 7 篇 abderrahmane nit...
  • 6 篇 david romero
  • 6 篇 daniel thalmann
  • 6 篇 nadia magnenat-t...
  • 6 篇 don harris

语言

  • 1,067 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"主题词=coding and information theory"
1070 条 记 录,以下是1-10 订阅
排序:
coding Theorems of information theory  1
收藏 引用
丛书名: Ergebnisse der Mathematik und ihrer Grenzgebiete. 2. Folge
1000年
作者: J. Wolfowitz
This monograph originated with a course of lectures on information theory which I gave at Cornell University during the academic year 1958-1959. It has no pretensions to exhaustiveness, and, indeed, no pretensions at ... 详细信息
来源: 评论
coding Theorems of information theory  2
收藏 引用
丛书名: Ergebnisse der Mathematik und ihrer Grenzgebiete. 2. Folge
1000年
作者: J. Wolfowitz
The imminent exhaustion of the first printing of this monograph and the kind willingness of the publishers have presented me with the opportunity to correct a few minor misprints and to make a number of additions to t... 详细信息
来源: 评论
information and coding theory  1
收藏 引用
丛书名: Springer Undergraduate Mathematics Series
1000年
作者: Gareth A. Jones J. Mary Jones
As this Preface is being written, the twentieth century is coming to an end. Historians may perhaps come to refer to it as the century of information, just as its predecessor is associated with the process of industri... 详细信息
来源: 评论
Network coding as a Performance Booster for Concurrent Multi-Path Transfer of Data in Multi-Hop Wireless Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2017年 第4期16卷 1047-1058页
作者: Arianpoo, Nasim Aydin, Ilknur Leung, Victor C. M. Univ British Columbia Dept Elect Engn Vancouver BC V6T 1Z4 Canada Farmingdale State Coll Comp Syst Dept Farmingdale NY 11735 USA
The emerging use of multi-homed wireless devices along with simultaneous multi-path data transfer offers tremendous potentials to improve the capacity of multi-hop wireless networks. The use of simultaneous data trans... 详细信息
来源: 评论
Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification
收藏 引用
IEEE TRANSACTIONS ON BIG DATA 2021年 第5期7卷 893-899页
作者: Farokhi, Farhad CSIROs Data61 Docklands Vic 3008 Australia Univ Melbourne Parkville Vic 3010 Australia
We consider the problem of publicly releasing a dataset for support vector machine classification while not infringing on the privacy of data subjects (i.e., individuals whose private information is stored in the data... 详细信息
来源: 评论
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2015年 第4期12卷 485-490页
作者: Cafaro, Massimo Civino, Roberto Masucci, Barbara Univ Salento Dept Engn Innovat I-73100 Lecce Italy Univ Salento Dept Math & Phys I-73100 Lecce Italy Univ Salerno Dept Comp Sci I-84084 Fisciano Italy
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierar... 详细信息
来源: 评论
The quest for error correction in biology
收藏 引用
IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE 2006年 第1期25卷 46-53页
作者: Gupta, MK Queens Univ Dept Math & Stat Kingston ON K7L 3N6 Canada
The goal of this article is to give a brief account of the recent developments in codes and biology. With the increasing understanding of biology and with the advancement of sequencing technology, the whole human geno... 详细信息
来源: 评论
Browser-in-the-Middle (BitM) attack
收藏 引用
INTERNATIONAL JOURNAL OF information SECURITY 2022年 第2期21卷 179-189页
作者: Tommasi, Franco Catalano, Christian Taurino, Ivan Univ Salento Dipartimento Ingn Innovaz Via Monteroni Lecce Italy
Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity a... 详细信息
来源: 评论
Linear-time list recovery of high-rate expander codes
收藏 引用
information AND COMPUTATION 2018年 第Part2期261卷 202-218页
作者: Hemenway, Brett Wootters, Mary Univ Penn Dept Comp & Informat Sci Philadelphia PA 19104 USA Stanford Univ Dept Comp Sci Stanford CA 94305 USA
We show that expander codes, when properly instantiated, are high-rate list recoverable codes with linear-time list recovery algorithms. List recoverable codes have applications to constructing efficiently list-decoda... 详细信息
来源: 评论
RQC Revisited and More Cryptanalysis for Rank-Based Cryptography
收藏 引用
IEEE TRANSACTIONS ON information theory 2024年 第3期70卷 2271-2286页
作者: Bidoux, Loic Briaud, Pierre Bros, Maxime Gaborit, Philippe Technol Innovat Inst Cryptog Res Ctr Abu Dhabi U Arab Emirates Inria F-75012 Paris France Sorbonne Univ UPMC Univ F-75006 Paris France Natl Inst Stand & Technol Gaithersburg MD 20899 USA Univ Limoges CNRS XLIM F-87000 Limoges France
In this paper, we revisit the Rank Quasi-Cyclic (RQC) (Melchor et al., IEEE IT, 2018) encryption scheme by proposing three possible variations for its design. Our first improvement relies on the introduction of Augmen... 详细信息
来源: 评论