Coding theory

Results: 1371



#Item
41Decoding Random Binary Linear Codes in 2n/20 : How 1 + 1 = 0 Improves Information Set Decoding Anja Becker1 , Antoine Joux1,2 , Alexander May3! , and Alexander Meurer3!! 1  Universit´e de Versailles Saint-Quentin, Labor

Decoding Random Binary Linear Codes in 2n/20 : How 1 + 1 = 0 Improves Information Set Decoding Anja Becker1 , Antoine Joux1,2 , Alexander May3! , and Alexander Meurer3!! 1 Universit´e de Versailles Saint-Quentin, Labor

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2012-05-23 11:45:44
42Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1  Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
43Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-23 18:24:49
44at HOME E arly L earning MATH   H elping your children

at HOME E arly L earning MATH   H elping your children

Add to Reading List

Source URL: earlymathlearning.com

Language: English - Date: 2013-09-01 15:52:09
45Coding and Cryptography Spring 2014 Tutorial Project #1 Due at the end of class. On Friday, we learned how to decode a linear code using ‘syndromes’. Make sure someone in your working group attended class on Friday,

Coding and Cryptography Spring 2014 Tutorial Project #1 Due at the end of class. On Friday, we learned how to decode a linear code using ‘syndromes’. Make sure someone in your working group attended class on Friday,

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
46Microsoft Word - MINUTES FROMMeeting

Microsoft Word - MINUTES FROMMeeting

Add to Reading List

Source URL: ugs.mst.edu

Language: English - Date: 2014-01-22 04:10:34
47A MULTIDIMENSIONAL COMPANDING SCHEME FOR SOURCE CODING WITH A PERCEPTUALLY RELEVANT DISTORTION MEASURE J. Crespo, P. Aguiar R. Heusdens

A MULTIDIMENSIONAL COMPANDING SCHEME FOR SOURCE CODING WITH A PERCEPTUALLY RELEVANT DISTORTION MEASURE J. Crespo, P. Aguiar R. Heusdens

Add to Reading List

Source URL: users.isr.ist.utl.pt

Language: English - Date: 2009-12-04 13:17:28
486536  IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 12, DECEMBER 2015 Optimal Achievable Rates for Interference Networks With Random Codes

6536 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 12, DECEMBER 2015 Optimal Achievable Rates for Interference Networks With Random Codes

Add to Reading List

Source URL: isl.stanford.edu

Language: English - Date: 2016-01-25 17:31:48
49highresRT_Logic-Kratos_Logo

highresRT_Logic-Kratos_Logo

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:43:34
50Microsoft Word - IBSNew_Trends_in_iTECH-final

Microsoft Word - IBSNew_Trends_in_iTECH-final

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:11