咨询与建议

限定检索结果

文献类型

  • 116 篇 期刊文献
  • 58 篇 会议
  • 5 篇 学位论文

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 88 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 9 篇 软件工程
    • 6 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
  • 79 篇 理学
    • 58 篇 数学
    • 18 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 科学技术史(分学科...
    • 2 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 农学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 179 篇 error-correcting...
  • 6 篇 error correction...
  • 5 篇 hamming distance
  • 5 篇 fault tolerance
  • 5 篇 nand flash memor...
  • 5 篇 hamming code
  • 5 篇 bch code
  • 4 篇 covering code
  • 4 篇 codes
  • 4 篇 fault-tolerance
  • 4 篇 memory
  • 4 篇 packet-error pro...
  • 4 篇 bit-error probab...
  • 4 篇 burst error
  • 4 篇 privacy
  • 4 篇 random code
  • 3 篇 ldpc
  • 3 篇 erroneous value
  • 3 篇 reliability
  • 3 篇 condition

机构

  • 4 篇 beijing univ pos...
  • 4 篇 beijing elect sc...
  • 3 篇 brno university ...
  • 3 篇 aalto univ sch e...
  • 3 篇 fsaei he nr toms...
  • 2 篇 georgia inst tec...
  • 2 篇 ryerson univ dep...
  • 2 篇 northwestern uni...
  • 2 篇 technion israel ...
  • 2 篇 univ bayreuth le...
  • 2 篇 caltech dept ele...
  • 2 篇 univ texas austi...
  • 2 篇 doshisha univ de...
  • 2 篇 charles universi...
  • 2 篇 univ rennes 1 ir...
  • 2 篇 univ bayreuth de...
  • 2 篇 univ calif davis...
  • 2 篇 univ valladolid ...
  • 2 篇 chuo univ dept e...
  • 1 篇 eth zurich signa...

作者

  • 6 篇 ostergard patric...
  • 4 篇 takeuchi ken
  • 4 篇 li yan-bing
  • 3 篇 östergård prj
  • 3 篇 huang wei
  • 3 篇 hamada m
  • 3 篇 bakeva verica
  • 3 篇 popovska-mitrovi...
  • 3 篇 ravagnani albert...
  • 2 篇 li yao
  • 2 篇 mihara takashi
  • 2 篇 abdel-ghaffar kh...
  • 2 篇 kiermaier michae...
  • 2 篇 kilic altan b.
  • 2 篇 guo zeyu
  • 2 篇 stapper ch
  • 2 篇 huang chu-hsiang
  • 2 篇 malek behzad
  • 2 篇 markovski smile
  • 2 篇 zavadskyi i. o.

语言

  • 167 篇 英文
  • 11 篇 其他
  • 1 篇 中文
检索条件"主题词=error-correcting code"
179 条 记 录,以下是111-120 订阅
排序:
A Quadratic Lower Bound for Three-Query Linear Locally Decodable codes over Any Field
收藏 引用
Journal of Computer Science & Technology 2012年 第4期27卷 678-686页
作者: David P.Woodruff IBM Almaden Research Center Yorktown HeightsN.Y.10598U.S.A.
A linear (q,δ,ε, m(n))-locally decodable code (LDC) C : F^n → F^m(n) is a linear transformation from the vector 1 space F^m(n) to the space F^m(n) for which each message symbol xi can be recovered wit... 详细信息
来源: 评论
Fault-Tolerant Quantum Secure Direct Communication Protocol Based On Decoherence-Free States (vol 54, pg 589, 2015)
收藏 引用
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS 2015年 第5期54卷 1737-1737页
作者: Li, Yan-Bing Song, Ting-Ting Huang, Wei Zhang, Wei-Wei Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China Northwestern Univ Dept Elect Engn & Comp Sci Evanston IL 60208 USA
In this paper, we propose a quantum secure direct communication scheme based on six-qubit decoherence-free (DF) states, which can protect communication against collective decoherence noise. With the combination of DF ... 详细信息
来源: 评论
Efficient List-Decoding With Constant Alphabet and List Sizes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2022年 第3期68卷 1663-1682页
作者: Guo, Zeyu Ron-Zewi, Noga Univ Haifa Dept Comp Sci IL-3498838 Haifa Israel Univ Texas Austin Dept Comp Sci Austin TX 78712 USA
We present an explicit and efficient algebraic construction of capacity-achieving list decodable codes with both constant alphabet and constant list sizes. More specifically, for any R is an element of (0, 1) and epsi... 详细信息
来源: 评论
UNIFORM DIRECT PRODUCT THEOREMS: SIMPLIFIED, OPTIMIZED, AND DERANDOMIZED
收藏 引用
SIAM JOURNAL ON COMPUTING 2010年 第4期39卷 1637-1665页
作者: Impagliazzo, Russell Jaiswal, Ragesh Kabanets, Valentine Wigderson, Avi Inst Adv Study Sch Math Princeton NJ 08540 USA Univ Calif San Diego Dept Comp Sci La Jolla CA 92093 USA Simon Fraser Univ Dept Comp Sci Burnaby BC V5A 1S6 Canada
The classical direct product theorem for circuits says that if a Boolean function f : {0, 1}(n) -> {0, 1} is somewhat hard to compute on average by small circuits, then the corresponding k-wise direct product funct... 详细信息
来源: 评论
Proposal for LDPC code Design System Using Multi-Objective Optimization and FPGA-Based Emulation
Proposal for LDPC Code Design System Using Multi-Objective O...
收藏 引用
8th International Conference on Evolvable Systems
作者: Ishida, Yukari Nosato, Hirotaka Takahashi, Eiichi Murakawa, Masahiro Kajitani, Isamu Furuya, Tatsumi Higuchi, Tetsuya Toho Univ 2-2-1 Miyama Chiba 2748510 Japan Natl Inst Adv Ind Sci & Technol Tsukuba Ibaraki 3058568 Japan
The paper proposes a low density parity check (LDPC) code design system to facilitate the design of communication systems using LDPC codes for error correction. The proposed LDPC code design system has three advantage... 详细信息
来源: 评论
Performances of Random codes Based on Quasigroups for transmission of audio files  23
Performances of Random Codes Based on Quasigroups for transm...
收藏 引用
20th Telecommunications Forum (TELFOR)
作者: Popovska-Mitrovikj, Aleksandra Ilievski, Vladimir Bakeva, Verica Univ Ss Cyril & Methodius Skopje Fac Comp Sci & Engn POB 393 Skopje Macedonia
error-correcting codes can be applied for transmission of images and audio files through a noise channel. Application of Random codes Based on Quasigroups (RCBQ) for image transmission is considered elsewhere. In this... 详细信息
来源: 评论
Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions  21st
Cheating-Immune Secret Sharing Schemes from Maiorana-McFarla...
收藏 引用
21st International Conference on Information Security and Cryptology (ICISC)
作者: dela Cruz, Romar B. Ol, Say Univ Philippines Diliman Inst Math Quezon City Philippines Teacher Educ Coll Phnom Penh Cambodia
We consider cheating-immune secret sharing schemes proposed by Pieprzyk and Zhang. This type of secret sharing scheme keeps dishonest participants from having a better chance (over the honest ones) of knowing the secr... 详细信息
来源: 评论
A Kind of Performance Improvement of Hamming code
A Kind of Performance Improvement of Hamming Code
收藏 引用
International Conference on Computing, Information and Control (ICCIC 2011)
作者: Wang, Hongli Tangshan Teachers Coll Dept Math & Informat Sci Tangshan 063000 Peoples R China
Hamming code is a parity code, the information bits and test bits must be mixed arrangement at a fixed location to check for errors s and correct the wrong. Based on the design principle of Hamming codes, this paper g... 详细信息
来源: 评论
Semi-parallel polar decoder architecture using shift-register-based partial-sum computation for 5G mobile communications
Semi-parallel polar decoder architecture using shift-registe...
收藏 引用
1st International Conference on Innovative Technology for Sustainable Development (ICITSD)
作者: Kumar, D. Dinesh Selvakumari, R. Shantha Mepco Schlenk Engn Coll Dept Elect & Commun Engn Sivakasi India
Polar codes are the recently adopted error correction codes in the 5th generation new radio (5G NR) mobile communication standards. The hardware architecture for encoding and decoding plays a significant role in achie... 详细信息
来源: 评论
Collaborative Defense Against Data Injection Attack in IEC61850 Based Smart Substations
Collaborative Defense Against Data Injection Attack in IEC61...
收藏 引用
IEEE-Power-and-Energy-Society General Meeting (PESGM)
作者: Macwan, Richard Drew, Christopher Panumpabi, Prosper Valdes, Alfonso Vaidya, Nitin Sauer, Pete Ishchenko, Dmitry Univ Illinois Informat Trust Inst Urbana IL 61801 USA ABB US Corp Res Ctr Raleigh NC USA
As the power distribution grid moves towards actualizing the concept of a smart grid, the dependence of reliable and secure grid operation on the communication architecture and data is increasing rapidly, along with t... 详细信息
来源: 评论