咨询与建议

限定检索结果

文献类型

  • 116 篇 期刊文献
  • 58 篇 会议
  • 5 篇 学位论文

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 88 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 9 篇 软件工程
    • 6 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
  • 79 篇 理学
    • 58 篇 数学
    • 18 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 科学技术史(分学科...
    • 2 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 农学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 179 篇 error-correcting...
  • 6 篇 error correction...
  • 5 篇 hamming distance
  • 5 篇 fault tolerance
  • 5 篇 nand flash memor...
  • 5 篇 hamming code
  • 5 篇 bch code
  • 4 篇 covering code
  • 4 篇 codes
  • 4 篇 fault-tolerance
  • 4 篇 memory
  • 4 篇 packet-error pro...
  • 4 篇 bit-error probab...
  • 4 篇 burst error
  • 4 篇 privacy
  • 4 篇 random code
  • 3 篇 ldpc
  • 3 篇 erroneous value
  • 3 篇 reliability
  • 3 篇 condition

机构

  • 4 篇 beijing univ pos...
  • 4 篇 beijing elect sc...
  • 3 篇 brno university ...
  • 3 篇 aalto univ sch e...
  • 3 篇 fsaei he nr toms...
  • 2 篇 georgia inst tec...
  • 2 篇 ryerson univ dep...
  • 2 篇 northwestern uni...
  • 2 篇 technion israel ...
  • 2 篇 univ bayreuth le...
  • 2 篇 caltech dept ele...
  • 2 篇 univ texas austi...
  • 2 篇 doshisha univ de...
  • 2 篇 charles universi...
  • 2 篇 univ rennes 1 ir...
  • 2 篇 univ bayreuth de...
  • 2 篇 univ calif davis...
  • 2 篇 univ valladolid ...
  • 2 篇 chuo univ dept e...
  • 1 篇 eth zurich signa...

作者

  • 6 篇 ostergard patric...
  • 4 篇 takeuchi ken
  • 4 篇 li yan-bing
  • 3 篇 östergård prj
  • 3 篇 huang wei
  • 3 篇 hamada m
  • 3 篇 bakeva verica
  • 3 篇 popovska-mitrovi...
  • 3 篇 ravagnani albert...
  • 2 篇 li yao
  • 2 篇 mihara takashi
  • 2 篇 abdel-ghaffar kh...
  • 2 篇 kiermaier michae...
  • 2 篇 kilic altan b.
  • 2 篇 guo zeyu
  • 2 篇 stapper ch
  • 2 篇 huang chu-hsiang
  • 2 篇 malek behzad
  • 2 篇 markovski smile
  • 2 篇 zavadskyi i. o.

语言

  • 167 篇 英文
  • 11 篇 其他
  • 1 篇 中文
检索条件"主题词=error-correcting code"
179 条 记 录,以下是61-70 订阅
排序:
Soft-error protection of TCAMs based on ECCs and asymmetric SRAM cells
收藏 引用
ELECTRONICS LETTERS 2014年 第24期50卷 1823-U187页
作者: Gherman, V. Cartron, M. CEA LIST Saclay Nano INNOV PC 172 F-91191 Gif Sur Yvette France
Content-addressable memories (CAMs) enable the comparison of their entire content to a search word in one single access. Ternary CAMs (TCAMs) provide the possibility to store and handle not only 0 s and 1 s but also d... 详细信息
来源: 评论
Uniformity for geometric codes over large extensions of Fq
收藏 引用
FINITE FIELDS AND THEIR APPLICATIONS 2011年 第4期17卷 373-376页
作者: Ballico, E. Univ Trento Dept Math I-38123 Povo TN Italy
For many codes defined geometrically over F-q (e.g. coming from a finite complete intersection or a vector bundle on a projective variety) we prove the existence of an extension F-q(e) (no explicit lower bound for e) ... 详细信息
来源: 评论
On the Limitations of Computational Fuzzy Extractors
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2023年 第3期E106A卷 350-354页
作者: Yasunaga, Kenji Yuzawa, Kosuke Tokyo Inst Technol Dept Math & Comp Sci Tokyo 1528552 Japan Kanazawa Univ Kanazawa 9201192 Japan
We present a negative result of fuzzy extractors with com-putational security. Specifically, we show that, under a computational condition, a computational fuzzy extractor implies the existence of an information-theor... 详细信息
来源: 评论
There is No Self-Dual Z4-Linear code Whose Gray Image Has the Parameters (72,236,16)
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2013年 第6期59卷 3384-3386页
作者: Kiermaier, Michael Univ Bayreuth Dept Math D-95440 Bayreuth Germany
It is shown that there is no self-dual Z(4)-linear code whose Gray image has the parameters (72, 2(36), 16).
来源: 评论
On the Size of Optimal Three-error-correcting Binary codes of Length 16
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2011年 第10期57卷 6824-6826页
作者: Ostergard, Patric R. J. Aalto Univ Sch Elect Engn Dept Commun & Networking Aalto 00076 Finland
Let A(n, d) denote the maximum size of a binary code with length n and minimum distance. It has been known for decades that A(16, 7) = A(17, 8) = 36 or 37, that is, that the size of optimal 3-error-correcting binary c... 详细信息
来源: 评论
Two new four-error-correcting binary codes
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2005年 第3期36卷 327-329页
作者: Östergård, PRJ Aalto Univ Dept Elect & Commun Engn Espoo 02015 Finland
Two four-error-correcting binary codes of length 21 and 22 and of cardinality 64 and 80, respectively, are constructed. The codes consist of a union of cosets of linear codes with dimension 3 and were found by a maxim... 详细信息
来源: 评论
LDPC codes for Communication Systems: Coding Theoretic Perspective
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 2022年 第8期E105B卷 894-905页
作者: Nozaki, Takayuki Isaka, Motohiko Yamaguchi Univ Coll Sci Grad Sch Sci & Technol Innovat Dept Informat Yamaguchi 7538512 Japan Yamaguchi Univ Res Inst Time Studies Yamaguchi 7538512 Japan Kwansei Gakuin Univ Dept Comp Sci Sanda 6691330 Japan
Low-density parity-check (LDPC) codes are widely used in communication systems for their high error-correcting performance. This survey introduces the elements of LDPC codes: decoding algorithms, code construction, en... 详细信息
来源: 评论
Computing sharp recovery structures for locally recoverable codes
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2020年 第8期88卷 1687-1698页
作者: Marquez-Corbella, Irene Martinez-Moro, Edgar Munuera, Carlos Univ La Laguna Dept Math Stat & O Res Tenerife 38200 Spain Univ Valladolid Inst Math Campus Miguel Delibes Valladolid 47011 Castilla Spain Univ Valladolid Dept Appl Math Avda Salamanca SN Valladolid 47014 Castilla Spain
A locally recoverable code is an error-correcting code such that any erasure in a single coordinate of a codeword can be recovered from a small subset of other coordinates. In this article we develop an algorithm that... 详细信息
来源: 评论
Quantum private comparison against decoherence noise
收藏 引用
QUANTUM INFORMATION PROCESSING 2013年 第6期12卷 2191-2205页
作者: Li, Yan-Bing Qin, Su-Juan Yuan, Zheng Huang, Wei Sun, Ying Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Chinese Acad Sci Inst Software State Key Lab Informat Secur Beijing 100190 Peoples R China Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China
In this paper, we propose a quantum private comparison scheme which can be used in decoherence noise scenario. With the combination of decoherence-free states and error-correcting code, it achieves a fault tolerant qu... 详细信息
来源: 评论
Nonbinary quantum codes derived from finite geometries
收藏 引用
FINITE FIELDS AND THEIR APPLICATIONS 2012年 第1期18卷 63-69页
作者: Clark, David Tonchev, Vladimir D. Michigan Technol Univ Dept Math Sci Houghton MI 49931 USA
The paper gives explicit parameters for several infinite families of q-ary quantum stabilizer codes. These codes are derived from combinatorial designs which arise from finite projective and affine geometries. (C) 201... 详细信息
来源: 评论