咨询与建议

限定检索结果

文献类型

  • 1,218 篇 期刊文献
  • 151 篇 会议
  • 49 册 图书
  • 46 篇 学位论文

馆藏范围

  • 1,453 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 1,008 篇 工学
    • 502 篇 计算机科学与技术...
    • 456 篇 电气工程
    • 141 篇 电子科学与技术(可...
    • 106 篇 信息与通信工程
    • 87 篇 核科学与技术
    • 66 篇 软件工程
    • 49 篇 控制科学与工程
    • 47 篇 光学工程
    • 19 篇 仪器科学与技术
    • 18 篇 生物工程
    • 11 篇 材料科学与工程(可...
    • 10 篇 网络空间安全
  • 671 篇 理学
    • 434 篇 数学
    • 157 篇 物理学
    • 52 篇 生物学
    • 42 篇 统计学(可授理学、...
    • 13 篇 化学
    • 8 篇 系统科学
    • 7 篇 科学技术史(分学科...
  • 102 篇 医学
    • 71 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 86 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 60 篇 教育学
    • 56 篇 心理学(可授教育学...
  • 26 篇 经济学
    • 24 篇 应用经济学
  • 21 篇 农学
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 14 篇 法学
    • 10 篇 社会学
  • 12 篇 文学
    • 7 篇 新闻传播学
  • 9 篇 哲学
    • 8 篇 哲学
  • 3 篇 艺术学

主题

  • 1,464 篇 coding theory
  • 88 篇 information theo...
  • 74 篇 algorithms
  • 45 篇 cryptography
  • 40 篇 data transmissio...
  • 36 篇 data compression...
  • 31 篇 digital electron...
  • 30 篇 computer simulat...
  • 29 篇 quantum theory
  • 29 篇 decoders (electr...
  • 28 篇 graph theory
  • 27 篇 signal processin...
  • 26 篇 mathematical ana...
  • 24 篇 error-correcting...
  • 24 篇 computer program...
  • 24 篇 performance eval...
  • 23 篇 mathematical mod...
  • 23 篇 simulation metho...
  • 23 篇 mathematical the...
  • 22 篇 computational co...

机构

  • 11 篇 technion israel ...
  • 10 篇 texas a&m univer...
  • 7 篇 russian acad sci...
  • 7 篇 caltech dept ele...
  • 7 篇 carnegie mellon ...
  • 6 篇 korea atom energ...
  • 6 篇 univ paris viii ...
  • 6 篇 univ calif san d...
  • 6 篇 hong kong univer...
  • 5 篇 sandia natl labs...
  • 5 篇 nanyang technol ...
  • 4 篇 princeton univ d...
  • 4 篇 nanjing univ sta...
  • 4 篇 n carolina state...
  • 4 篇 university of wa...
  • 4 篇 harvard univ sch...
  • 4 篇 state univ mosco...
  • 4 篇 univ connecticut...
  • 4 篇 coll holy cross ...
  • 4 篇 harish-chandra r...

作者

  • 13 篇 yaakobi eitan
  • 11 篇 vardy alexander
  • 11 篇 mesnager sihem
  • 10 篇 guruswami venkat...
  • 9 篇 gabrys ryan
  • 7 篇 gaborit philippe
  • 7 篇 braverman mark
  • 7 篇 may ee
  • 6 篇 bitzer dl
  • 6 篇 rosnick di
  • 6 篇 vouk ma
  • 5 篇 sole p
  • 5 篇 deneuville jean-...
  • 5 篇 gelles ran
  • 5 篇 yao hanwen
  • 5 篇 brakensiek joshu...
  • 5 篇 siegel paul h.
  • 5 篇 efremenko klim
  • 4 篇 sudan madhu
  • 4 篇 tsai shi-chun

语言

  • 1,328 篇 英文
  • 111 篇 其他
  • 24 篇 中文
  • 1 篇 法文
检索条件"主题词=coding theory"
1464 条 记 录,以下是971-980 订阅
排序:
A Linear-time Graph Kernel
A Linear-time Graph Kernel
收藏 引用
9th IEEE International Conference on Data Mining
作者: Hido, Shohei Kashima, Hisashi IBM Research - Tokyo Kanagawa Japan Department of Mathematical Informatics University of Tokyo Tokyo Japan
The design of a good kernel is fundamental for knowledge discovery from graph-structured data. Existing graph kernels exploit only limited information about the graph structures but are still computationally expensive... 详细信息
来源: 评论
The number of public keys in the McEliece-Sidel'nikov cryptosystem
收藏 引用
Moscow University Computational Mathematics and Cybernetics 2009年 第3期33卷 151-157页
作者: Chizhov, I.V. Faculty of Computational Mathematics and Cybernetics Moscow State University Moscow 119992 Russian Federation
The McEliece-Sidel'nikov cryptosystem is a modification of the McEliece cryptosystem, which is one of the oldest public-key cryptosystems. It was proposed by V. M. Sidel'nikov in 1994 and is based on the u-fol... 详细信息
来源: 评论
Efficient Bandwidth Transmission using Forward Error Correcting Code
Efficient Bandwidth Transmission using Forward Error Correct...
收藏 引用
2nd IEEE International Conference on Computer Science and Information Technology
作者: Hwegi, Yousef Ali, Nasser Jayachandran, M. Alfatah Univ Dept Comp Engn Tripoli Libya
In order to realize error free communication we have to add appropriate redundancy to the transmitted bit stream. This can be achieved using the Convolutional code. There are a number of techniques for decoding Convol... 详细信息
来源: 评论
A KNOWLEDGE-RICH APPROACH TO THE RAPID ENUMERATION OF QUASI-MAGIC SUDOKU SEARCH SPACES
A KNOWLEDGE-RICH APPROACH TO THE RAPID ENUMERATION OF QUASI-...
收藏 引用
1st International Conference on Agents and Artificial Intelligence
作者: Roach, P. A. Jones, S. K. Perkins, S. Grimstead, I. J. Univ Glamorgan Dept Comp & Math Sci Pontypridd CF37 1DL M Glam Wales Cardiff Univ Cardiff Wales
The popular logic puzzle, Sudoku, consists of placing the digits 1,...,9 into a 9 x 9 grid, such that each digit appears only once in each row, column, and subdivided 'mini-grid' of size 3 x 3. Uniqueness of s... 详细信息
来源: 评论
A Deterministic Reduction for the Gap Minimum Distance Problem
A Deterministic Reduction for the Gap Minimum Distance Probl...
收藏 引用
41st Annual ACM Symposium on theory of Computing
作者: Cheng, Qi Wan, Daqing Univ Oklahoma Sch Comp Sci Norman OK 73019 USA
Determining the minimum distance of a linear code is one of the most important problems in algorithmic coding theory. The exact version of the problem was shown to the NP-complete in [14]. In [8], the gap version of t... 详细信息
来源: 评论
How Social Are Task Representations?
收藏 引用
PSYCHOLOGICAL SCIENCE 2009年 第7期20卷 794-798页
作者: Hommel, Bernhard Colzato, Lorenza S. van den Wildenberg, Wery P. M. Leiden Univ Dept Psychol Cognit Psychol Unit NL-2333 AK Leiden Netherlands Univ Amsterdam NL-1012 WX Amsterdam Netherlands
The classical Simon effect shows that actions are carried out faster if they spatially correspond to the stimulus signaling them. Recent studies revealed that this is the case even when the two actions are carried out... 详细信息
来源: 评论
Code Construction for Multiple Sources Network coding
Code Construction for Multiple Sources Network Coding
收藏 引用
MobiHoc S3 Workshop
作者: Jafari, Mandi Fragouli, Christina Diggavi, Suhas Ecole Polytech Fed Lausanne CH-1015 Lausanne Switzerland
In several wireless applications multiple sources transmit information to one or more receivers, many times over unknown topologies. This is especially so in mobile networks where learning the topology may have prohib... 详细信息
来源: 评论
Wyner -Ziv coding and error control for video communication
Wyner -Ziv coding and error control for video communication
收藏 引用
作者: Fan, Xiaopeng Hong Kong University of Science and Technology (Hong Kong)
学位级别:Ph.D.
Video communication has received tremendous attention from both academia and industry. The conventional hybrid video coding scheme has demonstrated state-of-the-art coding performance. However, its application in vide... 详细信息
来源: 评论
The generation of Entangled Qudits and their Application in Probabilistic Superdense coding
收藏 引用
Chinese Physics Letters 2009年 第4期26卷 14-17页
作者: 林青 College of Information Science and Engineering Huaqiao University (Xiamen) Xiamen 361021
A scheme of the generation of entangled qutrits is presented, and then is generalized to entangled ququads and entangled qudits. With the entangled qutrits, an experimental scheme of probability superdense coding with... 详细信息
来源: 评论
Bounds on codes from smooth toric threefolds with rank(pic(x)) = 2
Bounds on codes from smooth toric threefolds with rank(pic(x...
收藏 引用
作者: Kimball, James Lee Texas A&M University
In 1998, J. P. Hansen introduced the construction of an error-correcting code over afinite field Fq from a convex integral polytope in R2. Given a polytope P ⊂ R2, thereis an associated toric variety XP , and Hansen u... 详细信息
来源: 评论