咨询与建议

限定检索结果

文献类型

  • 380 篇 期刊文献
  • 151 篇 会议
  • 50 册 图书
  • 37 篇 学位论文

馆藏范围

  • 607 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 323 篇 计算机科学与技术...
    • 198 篇 电气工程
    • 51 篇 信息与通信工程
    • 28 篇 软件工程
    • 27 篇 控制科学与工程
    • 23 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 生物工程
    • 5 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
  • 318 篇 理学
    • 275 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 14 篇 生物学
    • 4 篇 系统科学
    • 3 篇 化学
  • 15 篇 经济学
    • 14 篇 应用经济学
  • 14 篇 军事学
    • 13 篇 军队指挥学
  • 12 篇 管理学
    • 12 篇 管理科学与工程(可...
  • 11 篇 医学
    • 8 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 10 篇 农学
    • 8 篇 作物学
  • 3 篇 文学
    • 3 篇 新闻传播学
  • 2 篇 教育学
    • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 1 篇 法学

主题

  • 618 篇 coding theory
  • 39 篇 information theo...
  • 37 篇 cryptography
  • 18 篇 linear codes
  • 16 篇 decoding
  • 14 篇 reed-solomon cod...
  • 14 篇 graph theory
  • 14 篇 codes
  • 10 篇 flash memories
  • 10 篇 signal processin...
  • 10 篇 encoding
  • 10 篇 communication co...
  • 10 篇 covering radius
  • 9 篇 post-quantum cry...
  • 8 篇 lattices
  • 8 篇 polar codes
  • 8 篇 error-correcting...
  • 8 篇 security
  • 8 篇 coding mechanism...
  • 8 篇 finite fields

机构

  • 10 篇 technion israel ...
  • 8 篇 texas a&m univer...
  • 7 篇 caltech dept ele...
  • 7 篇 carnegie mellon ...
  • 6 篇 univ paris viii ...
  • 6 篇 hong kong univer...
  • 5 篇 sandia natl labs...
  • 5 篇 univ calif san d...
  • 4 篇 princeton univ d...
  • 4 篇 university of wa...
  • 4 篇 harvard univ sch...
  • 4 篇 coll holy cross ...
  • 4 篇 the university o...
  • 4 篇 univ calif berke...
  • 3 篇 technion israel ...
  • 3 篇 peking univ sch ...
  • 3 篇 polytech inst pa...
  • 3 篇 univ calif san d...
  • 3 篇 princeton univ p...
  • 3 篇 university of ne...

作者

  • 15 篇 yaakobi eitan
  • 11 篇 mesnager sihem
  • 10 篇 vardy alexander
  • 9 篇 guruswami venkat...
  • 9 篇 gabrys ryan
  • 7 篇 gaborit philippe
  • 7 篇 braverman mark
  • 7 篇 may ee
  • 6 篇 bitzer dl
  • 6 篇 rosnick di
  • 6 篇 vouk ma
  • 5 篇 sole p
  • 5 篇 deneuville jean-...
  • 5 篇 gelles ran
  • 5 篇 yao hanwen
  • 5 篇 brakensiek joshu...
  • 5 篇 siegel paul h.
  • 5 篇 efremenko klim
  • 4 篇 sudan madhu
  • 4 篇 tsai shi-chun

语言

  • 561 篇 英文
  • 31 篇 其他
  • 25 篇 中文
检索条件"主题词=coding theory"
618 条 记 录,以下是501-510 订阅
排序:
An error-correcting code framework for genetic sequence analysis
An error-correcting code framework for genetic sequence anal...
收藏 引用
Workshop on Genomics, Signal Processing and Statistics (GENSIPS)
作者: May, EE Vouk, MA Bitzer, DL Rosnick, DI Sandia Natl Labs Computat Biol Dept Albuquerque NM 87185 USA N Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
A fundamental challenge for engineering communication systems is the problem of transmitting information from the source to the receiver over a noisy channel. This same problem exists in a biological system. How can i... 详细信息
来源: 评论
Directions in polynomial reconstruction based cryptography
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2004年 第5期E87A卷 978-985页
作者: Kiayias, A Yung, M Univ Connecticut Dept Comp Sci & Engn Storrs CT 06269 USA Columbia Univ Dept Comp Sci New York NY 10027 USA
Cryptography and coding theory are closely related in many respects. Recently, the problem of "decoding Reed Solomon codes" (also known as "polynomial reconstruction") was suggested as an intractab... 详细信息
来源: 评论
Uniform asymptotics of some Abel sums arising in coding theory
收藏 引用
THEORETICAL COMPUTER SCIENCE 2001年 第1-2期263卷 145-158页
作者: Hwang, HK Acad Sinica Inst Stat Sci Taipei 11529 Taiwan
We derive uniform asymptotic expressions of some Abel sums appearing in some problems in coding theory and indicate the usefulness of these sums in other fields, like empirical processes, machine maintenance, analysis... 详细信息
来源: 评论
theory of optimal blocking of nonregular factorial designs
收藏 引用
CANADIAN JOURNAL OF STATISTICS-REVUE CANADIENNE DE STATISTIQUE 2004年 第1期32卷 57-72页
作者: Al, MY Zhang, RC Peking Univ Sch Math Sci Dept Probabil & Stat Beijing 100871 Peoples R China Nankai Univ Sch Math Sci Dept Stat Tianjin 300071 Peoples R China
The authors introduce the notion of split generalized wordlength pattern (GWP), i.e., treatment GWP and block GWP, for a blocked nonregular factorial design. They generalize the minimum aberration criterion to suit th... 详细信息
来源: 评论
Finite Fields and Applications: 7th International Conference, Fq7, Toulouse, France, May 5-9, 2003. Revised Papers  1
收藏 引用
丛书名: Lecture Notes in Computer Science
2004年
作者: Wilfried Meidl Arne Winterhof (auth.) Gary L. Mullen Alain Poli Henning Stichtenoth (eds.)
来源: 评论
Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanisms  04
Meta-EAH: an adaptive encoder based on adaptive codes. Movin...
收藏 引用
Proceedings of the 2004 international symposium on Information and communication technologies
作者: Dragoş Trincǎ "Al.I. Cuza" University Iasi Romania
Adaptive codes associate variable-length codewords to symbols being encoded depending on the previous symbols in the input data string. This class of codes has been introduced in [6] as a new class of non-standard var... 详细信息
来源: 评论
Study on the capacity of information hiding system on still images
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology 2004年 第11期26卷 1681-1685页
作者: Hu, Yun Niu, Xin-Xin Yang, Yi-Xian Info. Security Ctr. Beijing Univ. of Posts and Telecom. Beijing 100876 China
To evaluate and calculate the capacity of information hiding system is a crucial topic of the field. From the point of view of the coding theory and set theory, this paper suggests a methodology for calculating the ca... 详细信息
来源: 评论
An introduction to coding theory and the two-part minimum description length principle
收藏 引用
INTERNATIONAL STATISTICAL REVIEW 2001年 第2期69卷 169-183页
作者: Lee, TCM Colorado State Univ Dept Stat Ft Collins CO 80523 USA
This article provides a tutorial introduction to the so-called two-part minimum description length (MDL) principle proposed by Rissanen. This two-part MDL principle is a powerful methodology for solving many statistic... 详细信息
来源: 评论
Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard
收藏 引用
THEORETICAL COMPUTER SCIENCE 2003年 第3期290卷 2109-2120页
作者: Charon, L Hudry, O Lobstein, A Ecole Natl Super Telecommun Bretagne CNRS Dept Informat & Reseaux URA 820 F-75634 Paris 13 France
Let G = (V, E) be an undirected graph and C a subset of vertices. If the sets B-r(v) boolean AND C, v is an element of V (respectively, v is an element of V \ C), are all nonempty and different, where B-r(v) denotes t... 详细信息
来源: 评论
Characterization of generalized aberration of some designs in terms of their complementary designs
收藏 引用
JOURNAL OF STATISTICAL PLANNING AND INFERENCE 2003年 第1期117卷 141-151页
作者: Qin, H Cent China Normal Univ Dept Math Wuhan 430079 Peoples R China Hong Kong Baptist Univ Dept Math Kowloon Hong Kong Peoples R China
In this paper we generalize the concept of a pair of complementary designs D = (D:(D) over bar) to the case that D is a U-type design and the Hamming distances between all pairs of runs are the same. Relationships of ... 详细信息
来源: 评论