咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 3 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 18 篇 电气工程
    • 18 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 软件工程
  • 6 篇 理学
    • 4 篇 数学
    • 2 篇 生物学
    • 1 篇 科学技术史(分学科...
  • 2 篇 农学
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 28 篇 error-detecting ...
  • 4 篇 error-correcting...
  • 3 篇 arithmetic codes
  • 3 篇 fault tolerance
  • 3 篇 error detection ...
  • 3 篇 codes
  • 2 篇 automatic repeat...
  • 2 篇 package failures
  • 2 篇 byte organizatio...
  • 2 篇 side-channel ana...
  • 2 篇 physical attacks
  • 2 篇 error detection
  • 2 篇 protocols
  • 2 篇 data transmissio...
  • 2 篇 byte errors
  • 2 篇 concurrent error...
  • 2 篇 memories
  • 1 篇 nonlinear functi...
  • 1 篇 capacity analysi...
  • 1 篇 path sensitizati...

机构

  • 2 篇 bar ilan univ fa...
  • 2 篇 stanford univ di...
  • 1 篇 stanford univ de...
  • 1 篇 interdisciplinar...
  • 1 篇 delft univ techn...
  • 1 篇 yale univ dept e...
  • 1 篇 univ minnesota d...
  • 1 篇 univ iowa dept c...
  • 1 篇 univ stuttgart i...
  • 1 篇 univ stuttgart s...
  • 1 篇 munich universit...
  • 1 篇 univ estadual ca...
  • 1 篇 usn acad annapol...
  • 1 篇 dipartimento di ...
  • 1 篇 technion israel ...
  • 1 篇 mannheim univ ap...
  • 1 篇 beckhoff automat...
  • 1 篇 department of co...
  • 1 篇 tianjin univ ctr...
  • 1 篇 ben gurion univ ...

作者

  • 3 篇 polian ilia
  • 2 篇 frank schiller
  • 2 篇 roth ron m.
  • 2 篇 wakerly jf
  • 2 篇 dunning la
  • 2 篇 keren osnat
  • 1 篇 struengmann lutz
  • 1 篇 weber jos h.
  • 1 篇 herman t
  • 1 篇 makris yiorgos
  • 1 篇 almukhaizim sobe...
  • 1 篇 sayers il
  • 1 篇 kinniment dj
  • 1 篇 de almeida c
  • 1 篇 foerg fabian
  • 1 篇 honkala is
  • 1 篇 perry pn
  • 1 篇 wu huaming
  • 1 篇 smith je
  • 1 篇 avizienis a

语言

  • 23 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=error-detecting codes"
28 条 记 录,以下是1-10 订阅
排序:
error-detecting codes and fault-containing self-stabilization
收藏 引用
INFORMATION PROCESSING LETTERS 2000年 第1-2期73卷 41-46页
作者: Herman, T Pemmaraju, S Univ Iowa Dept Comp Sci Iowa City IA 52242 USA Indian Inst Technol Bombay Maharashtra India
Self-stabilizing algorithms recover from all cases of transient failure, but the mechanism of self-stabilization may be costly for mild cases of transient failure. error-detecting codes can be used to identify, with h... 详细信息
来源: 评论
NEW MAPPING RULES FOR COMBINATION OF M-ARY MODULATION AND error-detecting codes IN ARQ SYSTEMS
收藏 引用
IEE PROCEEDINGS-I COMMUNICATIONS SPEECH AND VISION 1990年 第4期137卷 197-204页
作者: BENELLI, G Dipartimento di Ingegneria Elettronica Università di Firenze Firenze Italy
In some ARQ schemes, the combination of modulation and channel coding improves the performance of a communication system. The paper describes a new method for the integration of an error-detecting code withM-ary modul... 详细信息
来源: 评论
On Single-error-detecting codes for DNA-Based Data Storage
收藏 引用
IEEE COMMUNICATIONS LETTERS 2021年 第1期25卷 41-44页
作者: Weber, Jos H. de Groot, Joost A. M. van Leeuwen, Charlot J. Delft Univ Technol Dept Appl Math NL-2628 CD Delft Netherlands
DNA-based storage is considered to be a promising option to accommodate huge amounts of data. The strings of nucleotides are prone to errors though. To reduce the error probability, these strings should satisfy constr... 详细信息
来源: 评论
Lester Hill's error-detecting codes
收藏 引用
CRYPTOLOGIA 2012年 第2期36卷 88-103页
作者: Christensen, Chris Joyner, David Torres, Jenna No Kentucky Univ Dept Math & Stat Highland Hts KY 41099 USA USN Acad Annapolis MD 21402 USA
Lester S. Hill, who is known for the polygraphic cipher that he published in 1929, published three papers about error-detecting codes in 1926 and 1927, and he and Louis Weisner submitted a patent application for an er... 详细信息
来源: 评论
RUNLENGTH-LIMITED codes FOR SINGLE error-DETECTION IN THE MAGNETIC RECORDING CHANNEL
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 1995年 第3期41卷 809-815页
作者: PERRY, PN COLL MICRONESIA FSM KOLONIAMICRONESIA
An arithmetic function that assigns the value 0, 1, or 2 to each binary sequence is introduced, We call this function the error-check value. Two sequences that differ by a single symmetric error or a single shift erro... 详细信息
来源: 评论
Concurrent error detection methods for asynchronous burst-mode machines
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2007年 第6期56卷 785-798页
作者: Almukhaizim, Sobeeh Makris, Yiorgos Yale Univ Dept Elect Engn New Haven CT 06520 USA Yale Univ Dept Elect Engn & Comp Sci New Haven CT 06520 USA
Asynchronous controllers exhibit various characteristics that limit the effectiveness and applicability of the Concurrent error Detection (CED) methods developed for their synchronous counterparts. Asynchronous Burst-... 详细信息
来源: 评论
LOW-COST RESIDUE codes AND THEIR APPLICATION TO SELF-CHECKING VLSI SYSTEMS
收藏 引用
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES 1985年 第4期132卷 197-202页
作者: SAYERS, IL KINNIMENT, DJ Department of Electrical and Electronic Engineering University of Newcastle upon Tyne Newcastle upon Tyne UK
The efficient application of error-detecting codes to VLSI designs requires a study of their cost and effectiveness to supplement the knowledge of their theoretical properties. The paper discusses the tradeoffs for a ... 详细信息
来源: 评论
error-Detection Schemes for Analog Content-Addressable Memories
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2024年 第7期73卷 1795-1808页
作者: Roth, Ron M. Technion Comp Sci Dept IL-3200003 Haifa Israel
Analog content-addressable memories (in short, a-CAMs) have been recently introduced as accelerators for machine-learning tasks, such as tree-based inference or implementation of nonlinear activation functions. The ce... 详细信息
来源: 评论
SEC BED DED codes FOR error CONTROL IN BYTE-ORGANIZED MEMORY-SYSTEMS
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1985年 第6期34卷 557-562页
作者: DUNNING, LA Department of Computer Science Bowling Green State University Bowling Green OH 4340 Abstract Authors References Cited By Keywords Metrics Similar Download Citation Email Print Request Permissions
SEC-ED-DED codes are single error correcting and double error detecting while simultaneously providing byte error detection. SEC-BED-DED codes are constructed for byte lengths of 5 and larger. For many byte lengths an... 详细信息
来源: 评论
PEDS: A Parallel error Detection Scheme for TCAM Devices
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2010年 第5期18卷 1665-1675页
作者: Bremler-Barr, Anat Hay, David Hendler, Danny Roth, Ron M. Interdisciplinary Ctr Efi Arazi Sch Comp Sci IL-46150 Herzliyya Israel Ben Gurion Univ Negev Dept Comp Sci IL-84105 Beer Sheva Israel Technion Israel Inst Technol Dept Comp Sci IL-32000 Haifa Israel
Ternary content-addressable memory ( TCAM) devices are increasingly used for performing high-speed packet classification. A TCAM consists of an associative memory that compares a search key in parallel against all ent... 详细信息
来源: 评论