咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献
  • 10 册 图书
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 41 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 30 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
  • 17 篇 理学
    • 17 篇 数学
    • 2 篇 系统科学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 41 篇 coding and infor...
  • 7 篇 networks
  • 7 篇 communications e...
  • 6 篇 computational ma...
  • 6 篇 combinatorics
  • 6 篇 probability theo...
  • 5 篇 computer communi...
  • 5 篇 communications e...
  • 3 篇 signal, speech a...
  • 3 篇 data encryption
  • 3 篇 machine learning
  • 3 篇 error control co...
  • 3 篇 cryptography
  • 2 篇 textual database...
  • 2 篇 data integration
  • 2 篇 semantic web
  • 2 篇 decoding
  • 2 篇 graph theory
  • 2 篇 linear codes
  • 2 篇 codes

机构

  • 2 篇 tata inst fundam...
  • 2 篇 stanford univ de...
  • 2 篇 univ penn dept c...
  • 1 篇 tech univ munich...
  • 1 篇 signal processin...
  • 1 篇 technical univer...
  • 1 篇 univ s carolina ...
  • 1 篇 syracuse univers...
  • 1 篇 sorbonne univ up...
  • 1 篇 univ pittsburgh ...
  • 1 篇 chiba univ dept ...
  • 1 篇 nyu peoples r ch...
  • 1 篇 southern connect...
  • 1 篇 inria f-75012 pa...
  • 1 篇 univ rome dept e...
  • 1 篇 northeastern uni...
  • 1 篇 farmingdale stat...
  • 1 篇 khalifa univ sci...
  • 1 篇 univ british col...
  • 1 篇 univ salento dep...

作者

  • 2 篇 hemenway brett
  • 2 篇 rohn eli
  • 2 篇 navarro gonzalo
  • 2 篇 wootters mary
  • 1 篇 k. deergha rao
  • 1 篇 re m.
  • 1 篇 aditya vempaty
  • 1 篇 gaborit philippe
  • 1 篇 sandro skansi
  • 1 篇 srinivasan aksha...
  • 1 篇 pontarelli s.
  • 1 篇 leditzky felix
  • 1 篇 rosen alon
  • 1 篇 zeghid m.
  • 1 篇 kabir sohag
  • 1 篇 bidoux loic
  • 1 篇 bobak nazer
  • 1 篇 chiarulli donald...
  • 1 篇 edward a. lee
  • 1 篇 juan moreno garc...

语言

  • 37 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=coding and information theory"
41 条 记 录,以下是21-30 订阅
排序:
Communication Technologies for Vehicles  1st ed. 2018
收藏 引用
丛书名: Lecture Notes in Computer Science
2018年
作者: Juan Moreno García-Loygorri,...
来源: 评论
Computer-Generated music using grammatical evolution
Computer-Generated music using grammatical evolution
收藏 引用
作者: Ortega, Alfonso
学位级别:ET
来源: 评论
Network coding as a Performance Booster for Concurrent Multi-Path Transfer of Data in Multi-Hop Wireless Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2017年 第4期16卷 1047-1058页
作者: Arianpoo, Nasim Aydin, Ilknur Leung, Victor C. M. Univ British Columbia Dept Elect Engn Vancouver BC V6T 1Z4 Canada Farmingdale State Coll Comp Syst Dept Farmingdale NY 11735 USA
The emerging use of multi-homed wireless devices along with simultaneous multi-path data transfer offers tremendous potentials to improve the capacity of multi-hop wireless networks. The use of simultaneous data trans... 详细信息
来源: 评论
A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2017年 第1期76卷 1177-1200页
作者: Hermassi, Houcemeddine Hamdi, Mimoun Rhouma, Rhouma Belghith, Safya Mdimegh ENIT Tunis Tunisia
We propose to incorporate encryption procedure into the lossy compression of voice data PCM(Pulse Code Modulation) based on the A-law approximation quantization. The proposed codec CPCM (Chaotic Pulse Code Modulaion) ... 详细信息
来源: 评论
Consolidation for compact constraints and Kendall tau LP decodable permutation codes
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2017年 第3期85卷 483-521页
作者: Hagiwara, Manabu Kong, Justin Chiba Univ Dept Math & Informat Inage Ku 1-33 Yayoi Cho Chiba Chiba 2630022 Japan
Invented in the 1960s, permutation codes have reemerged in recent years as a topic of great interest because of properties making them attractive for certain modern technological applications, especially flash memory.... 详细信息
来源: 评论
Secure Networked Inference with Unreliable Data Sources  1st ed. 2018
收藏 引用
2018年
作者: Aditya Vempaty Bhavya Kailkhura Pramod K. Varshney
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategie... 详细信息
来源: 评论
information theory for Electrical Engineers  1st ed. 2018
收藏 引用
丛书名: Signals and Communication Technology
2018年
作者: Orhan Gazi
This book explains the fundamental concepts of information theory, so as to help students better understand modern communication technologies. It was especially written for electrical and communication engineers worki... 详细信息
来源: 评论
A Selective Encryption Scheme with Multiple security Levels for the H. 264/AVC Video coding  16
A Selective Encryption Scheme with Multiple security Levels ...
收藏 引用
IEEE International Conference on Computer and information Technology (CIT)
作者: Sbiaa, F. Kotel, S. Zeghid, M. Tourki, R. Machhout, M. Baganne, A. Univ South Brittany Lab Informat Sci & Technol Commun & Knowledge Lab STICC Lorient France Univ Monastir Fac Sci Elect & Microelect Lab Monastir 5019 Tunisia
The H. 264 Advanced Video coding (H. 264/AVC) standard is considered to be the most commonly used format for video compression. Although it supports a very broad applications range covering all forms of digital compre... 详细信息
来源: 评论
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2015年 第4期12卷 485-490页
作者: Cafaro, Massimo Civino, Roberto Masucci, Barbara Univ Salento Dept Engn Innovat I-73100 Lecce Italy Univ Salento Dept Math & Phys I-73100 Lecce Italy Univ Salerno Dept Comp Sci I-84084 Fisciano Italy
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierar... 详细信息
来源: 评论
Why Cryptography Should Not Rely on Physical Attack Complexity  1
收藏 引用
丛书名: T-Labs Series in Telecommunication Services
2015年
作者: Juliane Krämer (auth.)
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on t... 详细信息
来源: 评论