咨询与建议

限定检索结果

文献类型

  • 116 篇 期刊文献
  • 58 篇 会议
  • 5 篇 学位论文

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 88 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 9 篇 软件工程
    • 6 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
  • 79 篇 理学
    • 58 篇 数学
    • 18 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 科学技术史(分学科...
    • 2 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 农学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 179 篇 error-correcting...
  • 6 篇 error correction...
  • 5 篇 hamming distance
  • 5 篇 fault tolerance
  • 5 篇 nand flash memor...
  • 5 篇 hamming code
  • 5 篇 bch code
  • 4 篇 covering code
  • 4 篇 codes
  • 4 篇 fault-tolerance
  • 4 篇 memory
  • 4 篇 packet-error pro...
  • 4 篇 bit-error probab...
  • 4 篇 burst error
  • 4 篇 privacy
  • 4 篇 random code
  • 3 篇 ldpc
  • 3 篇 erroneous value
  • 3 篇 reliability
  • 3 篇 condition

机构

  • 4 篇 beijing univ pos...
  • 4 篇 beijing elect sc...
  • 3 篇 brno university ...
  • 3 篇 aalto univ sch e...
  • 3 篇 fsaei he nr toms...
  • 2 篇 georgia inst tec...
  • 2 篇 ryerson univ dep...
  • 2 篇 northwestern uni...
  • 2 篇 technion israel ...
  • 2 篇 univ bayreuth le...
  • 2 篇 caltech dept ele...
  • 2 篇 univ texas austi...
  • 2 篇 doshisha univ de...
  • 2 篇 charles universi...
  • 2 篇 univ rennes 1 ir...
  • 2 篇 univ bayreuth de...
  • 2 篇 univ calif davis...
  • 2 篇 univ valladolid ...
  • 2 篇 chuo univ dept e...
  • 1 篇 eth zurich signa...

作者

  • 6 篇 ostergard patric...
  • 4 篇 takeuchi ken
  • 4 篇 li yan-bing
  • 3 篇 östergård prj
  • 3 篇 huang wei
  • 3 篇 hamada m
  • 3 篇 bakeva verica
  • 3 篇 popovska-mitrovi...
  • 3 篇 ravagnani albert...
  • 2 篇 li yao
  • 2 篇 mihara takashi
  • 2 篇 abdel-ghaffar kh...
  • 2 篇 kiermaier michae...
  • 2 篇 kilic altan b.
  • 2 篇 guo zeyu
  • 2 篇 stapper ch
  • 2 篇 huang chu-hsiang
  • 2 篇 malek behzad
  • 2 篇 markovski smile
  • 2 篇 zavadskyi i. o.

语言

  • 167 篇 英文
  • 11 篇 其他
  • 1 篇 中文
检索条件"主题词=error-correcting code"
179 条 记 录,以下是31-40 订阅
排序:
Flash Coding Scheme Based on error-correcting codes
Flash Coding Scheme Based on Error-Correcting Codes
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 2010)
作者: Huang, Qin Lin, Shu Abdel-Ghaffar, Khaled Univ Calif Davis Elect & Comp Engn Dept Davis CA 95616 USA
Flash memory is a non-volatile computer storage device which consists of blocks of cells. While increasing the voltage level of a single cell is fast and simple, reducing the level of a cell requires the erasing of th... 详细信息
来源: 评论
DISK ALLOCATION METHODS FOR CARTESIAN PRODUCT FILES BY USING error-correcting codeS
DISK ALLOCATION METHODS FOR CARTESIAN PRODUCT FILES BY USING...
收藏 引用
1994 IEEE International Conference on Systems, Man, and Cybernetics - Humans, Information and Technology (SMC 94)
作者: KOHNOSU, T NISHIJIMA, T HIRASAWA, S WASEDA UNIV SCH SCI & ENGNDEPT IND ENGN & MANAGEMENTSHINJUKU KUTOKYO 169JAPAN
Allocation methods for Cartesian product files on multiple disks by using linear error-correcting codes are proposed. This allocation methods can be applied to queries in which the characteristic of each attribute is ... 详细信息
来源: 评论
Distributed agreement and its relation with error-correcting codes  1
收藏 引用
16th International Conference on DIStributed Computing (DISC 2002)
作者: Friedman, R Mostéfaoui, A Rajsbaum, S Raynal, M Technion Israel Inst Technol Dept Comp Sci IL-32000 Haifa Israel Univ Rennes 1 IRISA F-35042 Rennes France HP Res Lab Cambridge MA 02139 USA Univ Nacl Autonoma Mexico Inst Matem Mexico City DF Mexico
The condition based approach identifies sets of input vectors, called conditions, for which it is possible-to design a protocol solving a distributed problem despite, process crashes. This paper investigates three rel... 详细信息
来源: 评论
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via error-correcting codes  21
Robust and Verifiable Information Embedding Attacks to Deep ...
收藏 引用
16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS)
作者: Jia, Jinyuan Wang, Binghui Gong, Neil Zhenqiang Duke Univ Durham NC 27706 USA
In the era of deep learning, a user often leverages a third-party machine learning tool to train a deep neural network (DNN) classifier and then deploys the classifier as an end-user software product (e.g., a mobile a... 详细信息
来源: 评论
error-correcting codes with Cryptographic Algorithms
Error-Correcting Codes with Cryptographic Algorithms
收藏 引用
Telecommunications Forum Telfor
作者: Aleksandra Popovska-Mitrovikj Smile Markovski Verica Bakeva Faculty of Computer Science and Engineering University "Ss Cyril and Methodius" - Skopje
error-correcting codes based on quasigroups are defined elsewhere. These codes are a combination of cryptographic algorithms and error correcting codes. In a paper of ours we succeed to improve the speed of the decodi... 详细信息
来源: 评论
Digital signature systems based on smart card and fingerprint feature
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第4期18卷 825-834页
作者: You Lin Xu Maozhi Zheng Zhiming Coll. of Communication Engineering Hangzhou Dianzi Univ. Hangzhou 310018 P. R. China School of Mathematics Peking University Beijing 100871 P. R. China School of Science Beijing Univ. of Aeronautics and Astronautics Beijing 100083 P. R. China
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... 详细信息
来源: 评论
The clique distribution in powers of hypercubes
收藏 引用
DISCRETE APPLIED MATHEMATICS 2021年 305卷 76-85页
作者: Kou, Yongfang Hu, Xiaomin Yang, Weihua Taiyuan Univ Technol Dept Math Taiyuan 030024 Shanxi Peoples R China
A fundamental problem in coding theory is to find the values of A(n, d), i.e., the A(n, d) is the size of the maximum binary code set of length n and minimum Hamming distance d. And A(n, d) can also be viewed as the s... 详细信息
来源: 评论
Promising Performance of PA-coded SIMO FM-DCSK Communication Systems
收藏 引用
CIRCUITS SYSTEMS AND SIGNAL PROCESSING 2008年 第6期27卷 915-926页
作者: Zhang, Chaoxian Wang, Lin Chen, Guanrong Xiamen Univ Dept Commun Engn Fujian 361005 Peoples R China City Univ Hong Kong Dept Elect Engn Hong Kong Hong Kong Peoples R China
Frequency-modulated differential chaos shift keying (FM-DCSK) is an attractive scheme which combines chaotic modulation with the spread-spectrum property. It is simple to implement and robust in multipath fading chann... 详细信息
来源: 评论
Secure and Robust Two-Phase Image Authentication
收藏 引用
IEEE TRANSACTIONS ON MULTIMEDIA 2015年 第7期17卷 945-956页
作者: Tabatabaei, Seyed Amir Hossein Ur-Rehman, Obaid Zivic, Natasa Ruland, Christoph Univ Siegen Chair Data Commun Syst D-57076 Siegen Germany
A novel two-phase robust content-based image authentication scheme is introduced. The proposed scheme is constructed based on a combination of hard and soft authentication using two existing generic approximate messag... 详细信息
来源: 评论
Resource placement in torus-based networks
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1997年 第10期46卷 1083-1092页
作者: Bae, MM Bose, B OREGON STATE UNIV DEPT COMP SCI CORVALLIS OR 97331 USA
This paper investigates methods to locate system resources, such as expensive hardware or software modules, to provide the most effective cost/performance trade-offs in a torus parallel machine. This paper contains so... 详细信息
来源: 评论