咨询与建议

限定检索结果

文献类型

  • 430 篇 期刊文献
  • 151 篇 会议
  • 50 册 图书
  • 37 篇 学位论文

馆藏范围

  • 657 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 461 篇 工学
    • 345 篇 计算机科学与技术...
    • 219 篇 电气工程
    • 68 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 34 篇 软件工程
    • 28 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 生物工程
    • 5 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
  • 325 篇 理学
    • 276 篇 数学
    • 28 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 14 篇 生物学
    • 4 篇 系统科学
    • 3 篇 化学
  • 16 篇 经济学
    • 15 篇 应用经济学
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 15 篇 管理学
    • 14 篇 管理科学与工程(可...
  • 13 篇 医学
    • 9 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 10 篇 农学
    • 8 篇 作物学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
    • 2 篇 教育学
  • 3 篇 文学
    • 3 篇 新闻传播学
  • 1 篇 法学

主题

  • 668 篇 coding theory
  • 39 篇 information theo...
  • 37 篇 cryptography
  • 17 篇 linear codes
  • 16 篇 decoding
  • 14 篇 reed-solomon cod...
  • 14 篇 graph theory
  • 13 篇 algorithms
  • 13 篇 wireless sensor ...
  • 11 篇 signal processin...
  • 11 篇 codes
  • 10 篇 flash memories
  • 10 篇 communication co...
  • 10 篇 covering radius
  • 9 篇 encoding
  • 9 篇 post-quantum cry...
  • 8 篇 digital video
  • 8 篇 lattices
  • 8 篇 data transmissio...
  • 8 篇 polar codes

机构

  • 10 篇 technion israel ...
  • 8 篇 texas a&m univer...
  • 7 篇 caltech dept ele...
  • 7 篇 carnegie mellon ...
  • 6 篇 univ paris viii ...
  • 6 篇 hong kong univer...
  • 5 篇 sandia natl labs...
  • 5 篇 univ calif san d...
  • 4 篇 princeton univ d...
  • 4 篇 nanjing univ sta...
  • 4 篇 university of wa...
  • 4 篇 harvard univ sch...
  • 4 篇 coll holy cross ...
  • 4 篇 the university o...
  • 4 篇 univ calif berke...
  • 3 篇 technion israel ...
  • 3 篇 peking univ sch ...
  • 3 篇 polytech inst pa...
  • 3 篇 univ calif san d...
  • 3 篇 princeton univ p...

作者

  • 15 篇 yaakobi eitan
  • 11 篇 mesnager sihem
  • 10 篇 vardy alexander
  • 9 篇 guruswami venkat...
  • 9 篇 gabrys ryan
  • 7 篇 gaborit philippe
  • 7 篇 braverman mark
  • 7 篇 may ee
  • 6 篇 bitzer dl
  • 6 篇 rosnick di
  • 6 篇 vouk ma
  • 5 篇 sole p
  • 5 篇 deneuville jean-...
  • 5 篇 gelles ran
  • 5 篇 yao hanwen
  • 5 篇 brakensiek joshu...
  • 5 篇 siegel paul h.
  • 5 篇 efremenko klim
  • 4 篇 sudan madhu
  • 4 篇 tsai shi-chun

语言

  • 608 篇 英文
  • 34 篇 其他
  • 25 篇 中文
检索条件"主题词=coding theory"
668 条 记 录,以下是481-490 订阅
排序:
Serial concatenation of Hermitian codes with ring-TCM codes
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2008年 第4期21卷 419-434页
作者: Johnston, Martin Carrasco, Rolando A. Univ Newcastle Upon Tyne Sch Elect Elect & Comp Engn Newcastle Upon Tyne NE1 7RU Tyne & Wear England
Hermitian codes are a class of very long algebraic-geometric (AG) codes constructed from Hermitian curves, which outperform Reed-Solomon codes defined over the same finite fields and with the same code rates, as recen... 详细信息
来源: 评论
A heuristic algorithm for the construction of good linear codes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION theory 2008年 第5期54卷 2388-2392页
作者: Zwanzger, Johannes Univ Bayreuth Dept Math D-95440 Bayreuth Germany
In this correspondence, we describe a heuristic method for the construction of linear codes with given parameters n, k, q, and a prescribed minimum distance of at least d. Our approach is based on a function estimatin... 详细信息
来源: 评论
Silver Cubes
收藏 引用
GRAPHS AND COMBINATORICS 2008年 第5期24卷 429-442页
作者: Ghebleh, Mohammad Goddyn, Luis A. Mahmoodian, Ebadollah S. Verdian-Rizi, Maryam Simon Fraser Univ Dept Math Burnaby BC V5A 1S6 Canada Sharif Univ Technol Dept Math Sci Tehran Iran
An n x n matrix A is said to be silver if, for i = 1, 2,..., n, each symbol in {1, 2,..., 2n-1} appears either in the ith row or the ith column of A. The 38th International Mathematical Olympiad asked whether a silver... 详细信息
来源: 评论
Protection of Sensitive Security Parameters in Integrated Circuits
收藏 引用
Conference on Mathematical Methods in Computer Science
作者: Lazich, Dejan E. Wuensche, Micaela Micronas GmbH Hans Bunte Str 19 D-79108 Freiburg Germany Univ Karlsruhe Inst fuer Algorithmen & Kognitive Syst D-76131 Karlsruhe Germany
To protect sensitive security parameters in the non-volatile memory of integrated circuits, a device is designed that generates a special secret key (called IC-Eigenkey) to symmetrically encrypt this data. The IC-Eige... 详细信息
来源: 评论
On Partial Correlations of Various Z4 Sequence Families
On Partial Correlations of Various Z<sub>4</sub> Sequence Fa...
收藏 引用
5th International Conference on Sequences and Their Applications (SETA 2008)
作者: Udayal, Parampalli Boztas, Serdar Univ Melbourne Dept Comp Sci & Software Engn Melbourne Vic 3010 Australia RMIT Univ Sch Math & Geospat Sci Melbourne Vic 3001 Australia
Galois ring m-sequences were introduced in the late 1980s and early 1990s, and have near-optimal full periodic correlations. They are related to Z(4)-linear codes, and are used in CDMA communications. We consider peri... 详细信息
来源: 评论
Quantum error control codes
Quantum error control codes
收藏 引用
作者: Abdelhamid Awad Aly Ahmed, Salah Texas A&M University
学位级别:Ph.D.
It is conjectured that quantum computers are able to solve certain problems more quickly than any deterministic or probabilistic computer. For instance, Shor’s algorithm is able to factor large integers in polynomial... 详细信息
来源: 评论
CONSTRUCTION OF LINEAR CODES HAVING PRESCRIBED PRIMAL-DUAL MINIMUM DISTANCE WITH APPLICATIONS IN CRYPTOGRAPHY
收藏 引用
Albanian Journal of Mathematics 2008年 第3期2卷 221-227页
作者: Axel Kohnert
A method is given for the construction of linear codes with prescribed minimum distance and also prescribed minimum distance of the dual code. This works for codes over arbitrary finite fields. In the case of binary c... 详细信息
来源: 评论
coding theory based models for protein translation initiation in prokaryotic organisms
收藏 引用
BIOSYSTEMS 2004年 第1-3期76卷 249-260页
作者: May, EE Vouk, MA Bitzer, DL Rosnick, DI Sandia Natl Labs Computat Biol Dept Albuquerque NM 87185 USA N Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
Our research explores the feasibility of using communication theory, error control (EC) coding theory specifically, for quantitatively modeling the protein translation initiation mechanism. The messenger RNA (mRNA) of... 详细信息
来源: 评论
A generic construction of Cartesian authentication codes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION theory 2007年 第6期53卷 2229-2235页
作者: Ding, Cunsheng Helleseth, Tor Klove, Torleiv Wang, Xuesong Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Kowloon Hong Kong Peoples R China Univ Bergen Dept Informat N-5020 Bergen Norway
In this paper, a coding-theory construction of Cartesian authentication codes is presented. The construction is a generalization of some known constructions. Within the framework of this generic construction, several ... 详细信息
来源: 评论
Nonbinary quantum goppa codes exceeding the quantum Gilbert-Varshamov bound
收藏 引用
QUANTUM INFORMATION PROCESSING 2007年 第3期6卷 143-158页
作者: Niehage, Annika Univ Mannheim Fak Math & Informat D-68131 Mannheim Germany
An explicit construction for nonbinary quantum Goppa codes exceeding the quantum Gilbert-Varshamov bound is given. First, we introduce a weighted symplectic inner product and show a method how to transform weighted co... 详细信息
来源: 评论