咨询与建议

限定检索结果

文献类型

  • 1,218 篇 期刊文献
  • 151 篇 会议
  • 49 册 图书
  • 46 篇 学位论文

馆藏范围

  • 1,453 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 1,008 篇 工学
    • 502 篇 计算机科学与技术...
    • 456 篇 电气工程
    • 141 篇 电子科学与技术(可...
    • 106 篇 信息与通信工程
    • 87 篇 核科学与技术
    • 66 篇 软件工程
    • 49 篇 控制科学与工程
    • 47 篇 光学工程
    • 19 篇 仪器科学与技术
    • 18 篇 生物工程
    • 11 篇 材料科学与工程(可...
    • 10 篇 网络空间安全
  • 671 篇 理学
    • 434 篇 数学
    • 157 篇 物理学
    • 52 篇 生物学
    • 42 篇 统计学(可授理学、...
    • 13 篇 化学
    • 8 篇 系统科学
    • 7 篇 科学技术史(分学科...
  • 102 篇 医学
    • 71 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 86 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 60 篇 教育学
    • 56 篇 心理学(可授教育学...
  • 26 篇 经济学
    • 24 篇 应用经济学
  • 21 篇 农学
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 14 篇 法学
    • 10 篇 社会学
  • 12 篇 文学
    • 7 篇 新闻传播学
  • 9 篇 哲学
    • 8 篇 哲学
  • 3 篇 艺术学

主题

  • 1,464 篇 coding theory
  • 88 篇 information theo...
  • 74 篇 algorithms
  • 45 篇 cryptography
  • 40 篇 data transmissio...
  • 36 篇 data compression...
  • 31 篇 digital electron...
  • 30 篇 computer simulat...
  • 29 篇 quantum theory
  • 29 篇 decoders (electr...
  • 28 篇 graph theory
  • 27 篇 signal processin...
  • 26 篇 mathematical ana...
  • 24 篇 error-correcting...
  • 24 篇 computer program...
  • 24 篇 performance eval...
  • 23 篇 mathematical mod...
  • 23 篇 simulation metho...
  • 23 篇 mathematical the...
  • 22 篇 computational co...

机构

  • 11 篇 technion israel ...
  • 10 篇 texas a&m univer...
  • 7 篇 russian acad sci...
  • 7 篇 caltech dept ele...
  • 7 篇 carnegie mellon ...
  • 6 篇 korea atom energ...
  • 6 篇 univ paris viii ...
  • 6 篇 univ calif san d...
  • 6 篇 hong kong univer...
  • 5 篇 sandia natl labs...
  • 5 篇 nanyang technol ...
  • 4 篇 princeton univ d...
  • 4 篇 nanjing univ sta...
  • 4 篇 n carolina state...
  • 4 篇 university of wa...
  • 4 篇 harvard univ sch...
  • 4 篇 state univ mosco...
  • 4 篇 univ connecticut...
  • 4 篇 coll holy cross ...
  • 4 篇 harish-chandra r...

作者

  • 13 篇 yaakobi eitan
  • 11 篇 vardy alexander
  • 11 篇 mesnager sihem
  • 10 篇 guruswami venkat...
  • 9 篇 gabrys ryan
  • 7 篇 gaborit philippe
  • 7 篇 braverman mark
  • 7 篇 may ee
  • 6 篇 bitzer dl
  • 6 篇 rosnick di
  • 6 篇 vouk ma
  • 5 篇 sole p
  • 5 篇 deneuville jean-...
  • 5 篇 gelles ran
  • 5 篇 yao hanwen
  • 5 篇 brakensiek joshu...
  • 5 篇 siegel paul h.
  • 5 篇 efremenko klim
  • 4 篇 sudan madhu
  • 4 篇 tsai shi-chun

语言

  • 1,328 篇 英文
  • 111 篇 其他
  • 24 篇 中文
  • 1 篇 法文
检索条件"主题词=coding theory"
1464 条 记 录,以下是1081-1090 订阅
排序:
On the construction of permutation arrays via mappings from binary vectors to permutations
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2006年 第2期40卷 139-155页
作者: Huang, Yen-Ying Tsai, Shi-Chun Wu, Hsin-Lung Natl Chiao Tung Univ Dept Comp Sci Hsinchu 30050 Taiwan
An (n, d, k)-mapping f is a mapping from binary vectors of length n to permutations of length n + k such that for all x, y is an element of {0, 1}(n), d(H) (f (x), f (y)) >= d(H)(x, y) + d, if d(H) (x, y) (n + k)-... 详细信息
来源: 评论
Trellis-hopping turbo coding
收藏 引用
IEE PROCEEDINGS-COMMUNICATIONS 2006年 第6期153卷 966-975页
作者: Castineira Moreira, J. Petruzzi, D. M. Liberatori, M. C. Honary, B. Univ Mar del Plata Sch English Dept Elect RA-4302 JB Justo Argentina Univ Lancaster Dept Commun Syst Lancaster England
We present a turbo coding scheme whose constituent codes are designed using convolutional encoders with time-varying coefficients. These encoders are finite state sequence machines that operate over the Galois field G... 详细信息
来源: 评论
Binary shape coding using finite automata
收藏 引用
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING 2006年 第5期153卷 695-702页
作者: Makarov, A. Moniri, M. Staffordshire Univ Fac Comp Engn & Technol Stoke On Trent ST18 0DF Staffs England
Two new binary shape-coding techniques that are based on finite automata methods are proposed. Both contour-based and bitmap-based approaches to shape coding are investigated using one-dimensional-weighted finite auto... 详细信息
来源: 评论
Performance of Hermitian codes using combined error and erasure decoding
收藏 引用
IEE PROCEEDINGS-COMMUNICATIONS 2006年 第1期153卷 21-30页
作者: Johnston, M Carrasco, RA Univ Newcastle Upon Tyne Sch Elect Elect & Comp Engn Newcastle Upon Tyne NE1 7RU Tyne & Wear England
The authors have previously implemented a hard-decision decoder and have shown with simulation results that Hermitian codes perform well over the AWGN and Rayleigh fading channel, owing to their large code lengths. Ho... 详细信息
来源: 评论
New linear codes derived from binary cyclic codes of length 151
收藏 引用
IEE PROCEEDINGS-COMMUNICATIONS 2006年 第5期153卷 581-585页
作者: Tjhai, C. Tomlinson, M. Grassl, M. Horan, R. Ahmed, M. Ambroze, M. Univ Plymouth Fixed & Mobile Commun Res Plymouth PL4 8AA Devon England Univ Karlsruhe TH Inst Algorithmen & Kognit Syst D-76128 Karlsruhe Germany
The minimum distance of all binary cyclic codes of length 151 is determined. Almost all of these cyclic codes have the same parameters as the best linear codes given in Brouwer's database. A nested chain of linear... 详细信息
来源: 评论
The optimality of allocation methods for bounded disagreement search queries: The possible and the impossible
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2006年 第9期18卷 1194-1206页
作者: Abdel-Ghaffar, Khaled A. S. El Abbadi, Amr Univ Calif Davis Dept Elect & Comp Engn Davis CA 95616 USA Univ Calif Santa Barbara Dept Comp Sci Santa Barbara CA 93106 USA
Data Allocation on multiple I/O devices manifests itself in many computing systems, both centralized and distributed. Data is partitioned on multiple I/O devices and clients issue various types of queries to retrieve ... 详细信息
来源: 评论
Asymmetric rate compatible turbo codes in hybrid automatic repeat request schemes
收藏 引用
IEE PROCEEDINGS-COMMUNICATIONS 2006年 第5期153卷 603-610页
作者: Oteng-Amoako, K. Nooshabadi, S. Univ New S Wales Sch Elect Engn & Telecommun Sydney NSW 2052 Australia
The authors present asymmetric turbo hybrid automatic-repeat-request (ATH-ARQ) schemes that employ component code selection and asymmetric rate compatible punctured turbo codes (ARCPT) for enhanced performance in fadi... 详细信息
来源: 评论
Encryption of a volume hologram by complementary input image and binary amplitude mask
收藏 引用
OPTICS COMMUNICATIONS 2006年 第1期258卷 9-17页
作者: Kim, H Lee, YH Sungkyunkwan Univ Sch Informat & Commun Engn Suwon 440746 South Korea Samsung Electromech Co Cent R&D Inst Opt Module Lab Suwon 443743 Kyongkido South Korea
A novel volume-hologram encryption system is proposed, in which the stored binary image can be restored only by the correct random binary amplitude mask. In our system the encryption is done by overlapping two hologra... 详细信息
来源: 评论
On the complexity of computing the capacity of codes that avoid forbidden difference patterns
收藏 引用
IEEE TRANSACTIONS ON INFORMATION theory 2006年 第11期52卷 5122-5127页
作者: Blondel, Vincent D. Jungers, Raphael Protasov, Vladimir Univ Catholique Louvain Dept Engn Math B-1348 Louvain Belgium Moscow MV Lomonosov State Univ Dept Mech & Math Moscow 119992 Russia
Some questions related to the computation of the capacity of codes that avoid forbidden difference patterns are analysed. The maximal number of it-bit sequences whose pairwise differences do not contain some given for... 详细信息
来源: 评论
Spectra of multimode coded signals
收藏 引用
IEE PROCEEDINGS-COMMUNICATIONS 2006年 第3期153卷 383-391页
作者: Fair, I. J. Zhu, Y. Hughes, A. P. Univ Alberta Dept Elect & Comp Engn Edmonton AB T6G 2V4 Canada
Multimode coding is an efficient block coding technique that introduces control over sequence statistics by generating a number of alternatives to represent the source word in each encoding interval and then selecting... 详细信息
来源: 评论