咨询与建议

限定检索结果

文献类型

  • 116 篇 期刊文献
  • 58 篇 会议
  • 5 篇 学位论文

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 88 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 9 篇 软件工程
    • 6 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
  • 79 篇 理学
    • 58 篇 数学
    • 18 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 科学技术史(分学科...
    • 2 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 农学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 179 篇 error-correcting...
  • 6 篇 error correction...
  • 5 篇 hamming distance
  • 5 篇 fault tolerance
  • 5 篇 nand flash memor...
  • 5 篇 hamming code
  • 5 篇 bch code
  • 4 篇 covering code
  • 4 篇 codes
  • 4 篇 fault-tolerance
  • 4 篇 memory
  • 4 篇 packet-error pro...
  • 4 篇 bit-error probab...
  • 4 篇 burst error
  • 4 篇 privacy
  • 4 篇 random code
  • 3 篇 ldpc
  • 3 篇 erroneous value
  • 3 篇 reliability
  • 3 篇 condition

机构

  • 4 篇 beijing univ pos...
  • 4 篇 beijing elect sc...
  • 3 篇 brno university ...
  • 3 篇 aalto univ sch e...
  • 3 篇 fsaei he nr toms...
  • 2 篇 georgia inst tec...
  • 2 篇 ryerson univ dep...
  • 2 篇 northwestern uni...
  • 2 篇 technion israel ...
  • 2 篇 univ bayreuth le...
  • 2 篇 caltech dept ele...
  • 2 篇 univ texas austi...
  • 2 篇 doshisha univ de...
  • 2 篇 charles universi...
  • 2 篇 univ rennes 1 ir...
  • 2 篇 univ bayreuth de...
  • 2 篇 univ calif davis...
  • 2 篇 univ valladolid ...
  • 2 篇 chuo univ dept e...
  • 1 篇 eth zurich signa...

作者

  • 6 篇 ostergard patric...
  • 4 篇 takeuchi ken
  • 4 篇 li yan-bing
  • 3 篇 östergård prj
  • 3 篇 huang wei
  • 3 篇 hamada m
  • 3 篇 bakeva verica
  • 3 篇 popovska-mitrovi...
  • 3 篇 ravagnani albert...
  • 2 篇 li yao
  • 2 篇 mihara takashi
  • 2 篇 abdel-ghaffar kh...
  • 2 篇 kiermaier michae...
  • 2 篇 kilic altan b.
  • 2 篇 guo zeyu
  • 2 篇 stapper ch
  • 2 篇 huang chu-hsiang
  • 2 篇 malek behzad
  • 2 篇 markovski smile
  • 2 篇 zavadskyi i. o.

语言

  • 167 篇 英文
  • 11 篇 其他
  • 1 篇 中文
检索条件"主题词=error-correcting code"
179 条 记 录,以下是81-90 订阅
排序:
Switching codes and designs
收藏 引用
DISCRETE MATHEMATICS 2012年 第3期312卷 621-632页
作者: Ostergard, Patric R. J. Aalto Univ Sch Elect Engn Dept Commun & Networking Aalto 00076 Finland Univ Bayreuth Lehrstuhl Math 2 D-95440 Bayreuth Germany
Various local transformations of combinatorial structures (codes, designs, and related structures) that leave the basic parameters unaltered are here unified under the principle of switching. The purpose of the study ... 详细信息
来源: 评论
Two characterizations of crooked functions
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2008年 第2期54卷 864-866页
作者: Godsil, Chris Roy, Aidan Univ Waterloo Dept Combinator & Optimizat Waterloo ON N2L 3G1 Canada Univ Calgary Inst Quantum Informat Sci Calgary AB T2N 1N4 Canada
In this correspondence, we give two characterizations of crooked functions: one based on the minimum distance of a Preparata-like code, and the other based on the distance-regularity of a crooked graph.
来源: 评论
The (non-)existence of perfect codes in Fibonacci cubes
收藏 引用
INFORMATION PROCESSING LETTERS 2016年 第5期116卷 387-390页
作者: Ashrafi, Ali Reza Azarija, Jernej Babai, Azam Fathalikhani, Khadijeh Klavzar, Sandi Univ Kashan Fac Math Sci Dept Pure Math Kashan Iran Inst Math Phys & Mech Ljubljana Slovenia Univ Qom Dept Math Qom Iran Univ Ljubljana Fac Math & Phys Ljubljana 61000 Slovenia Univ Maribor Fac Nat Sci & Math Maribor Slovenia
The Fibonacci cube Gamma(n) is obtained from the n-cube Q(n) by removing all the vertices that contain two consecutive 1s. It is proved that Gamma(n) admits a perfect code if and only if n <= 3. (C) 2016 Elsevier B... 详细信息
来源: 评论
Efficient Successive-Cancellation Polar Decoder Based on Redundant LLR Representation
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS 2018年 第12期65卷 1944-1948页
作者: Yoon, Hye-Yeon Kim, Tae-Hwan Korea Aerosp Univ Sch Elect & Informat Engn Goyang 412791 South Korea
This brief presents an efficient architecture of the polar decoder that employs the successive-cancellation (SC) decoding algorithm. In the SC decoding algorithm, each bit is decoded successively by recursively calcul... 详细信息
来源: 评论
A New Encoding and Decoding System of Reed-Solomon codes for HDD
收藏 引用
IEEE TRANSACTIONS ON MAGNETICS 2009年 第10期45卷 3757-3760页
作者: Matsui, Hajime Mita, Seiichi Toyota Technol Inst Tenpa Ku Nagoya Aichi 4688511 Japan
A novel encoding scheme and a unified encoder and decoder system for Reed-Solomon codes are proposed. The proposed system has a smaller circuit scale than the conventional system for more than 10 correctable errors fo... 详细信息
来源: 评论
An analysis of Chen's construction of minimum-distance five codes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2000年 第2期46卷 505-511页
作者: Batten, LM Davidson, M Storme, L Univ Manitoba Dept Math Winnipeg MB R3T 2N2 Canada State Univ Ghent Dept Pure Math & Comp Algebra B-9000 Ghent Belgium
In 1991, C. L. Chen used the inverted construction Y-1 on binary linear codes of minimum Hamming distance five to construct a new [47, 36, 5] code. In this paper, we examine this construction in depth and show that no... 详细信息
来源: 评论
A Secure PUF-Based Unilateral Authentication Scheme for RFID System
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2018年 第2期103卷 1699-1712页
作者: Maurya, Pramod Kumar Bagchi, Satya Natl Inst Technol Durgapur Dept Math Burdwan W Bengal India
Privacy and security concerns are significant barrier for RFID deployment in many applications in modern day world. The implementation of authentication schemes which provide reasonable security under the resource con... 详细信息
来源: 评论
ECC-Based Bit-Write Reduction code Generation for Non-Volatile Memory
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2015年 第12期E98A卷 2494-2504页
作者: Tawada, Masashi Kimura, Shinji Yanagisawa, Masao Togawa, Nozomu Waseda Univ Dept Comp Sci & Commun Engn Tokyo 1698555 Japan Waseda Univ Grad Sch Infomat Prod & Syst Kitakyushu Fukuoka 8080135 Japan
Non-volatile memory has many advantages such as high density and low leakage power but it consumes larger writing energy than SRAM. It is quite necessary to reduce writing energy in non-volatile memory design. In this... 详细信息
来源: 评论
4-Sets-Cut-Decoding algorithms for random codes based on quasigroups
收藏 引用
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS 2015年 第10期69卷 1417-1428页
作者: Popovska-Mitrovikj, Aleksandra Markovski, Smile Bakeva, Verica Ss Cyril & Methodius Univ Skopje Fac Comp Sci & Engn Skopje Macedonia
The decoding speed is the biggest problem of random codes based on quasigroups proposed elsewhere. These codes are a combination of cryptographic algorithms and error-correcting codes. In our previous paper we propose... 详细信息
来源: 评论
Locally recoverable codes from rational maps
收藏 引用
FINITE FIELDS AND THEIR APPLICATIONS 2018年 54卷 80-100页
作者: Munuera, Carlos Tenorio, Wanderson Univ Valladolid Dept Appl Math Avda Salamanca SN Valladolid 47014 Castilla Spain Univ Fed Uberlandia Fac Matemat Av JN Avila 2121 BR-38408902 Uberlandia MG Brazil
Locally recoverable codes are error-correcting codes allowing local recovery of lost encoded data in a codeword. We give a method to construct locally recoverable codes from rational maps between affine spaces, whose ... 详细信息
来源: 评论