Error detection and correction

Results: 1767



#Item
401Information / Telecommunications engineering / Data transmission / Computer arithmetic / Binary arithmetic / Forward error correction / Bit error rate / Low-density parity-check code / Network packet / Error detection and correction / Coding theory / Information theory

Efficient Error Estimating Coding: Feasibility and Applications∗ Binbin Chen Ziling Zhou Yuda Zhao

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2011-05-10 03:27:48
402Cryptographic protocols / Electronic commerce / Error detection and correction / Public key certificate / X.509 / Root certificate / Transport Layer Security / Hash tree / Digital signature / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 6962 Category: Experimental ISSN: B. Laurie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2013-06-06 16:56:32
403Engineering / Software quality / Reliability engineering / Safety / Redundancy / Error detection and correction / Fault-tolerant system / Triple modular redundancy / Nuclear magnetic resonance / Fault-tolerant computer systems / Computing / Systems engineering

Fluid NMR - Performing Power/Reliability Tradeoffs for Applications with Error Tolerance John Sartori, Joseph Sloan, Rakesh Kumar – UIUC ABSTRACT N-modular redundancy (NMR) [1] has long been the

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-08-20 12:05:17
404Telecommunications engineering / Error detection and correction / Forward error correction / Bit error rate / Goodput / Packet loss / Network packet / Throughput / Transmission Control Protocol / Network performance / Information / Data transmission

Efficient Error Estimating Coding: ∗ Feasibility and Applications Binbin Chen Ziling Zhou

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2010-06-18 06:30:25
405SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
406Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.altcoinfever.com

Language: English - Date: 2014-01-01 18:43:09
407Mathematics / Computer arithmetic / Computing / Binary arithmetic / Computer memory / Hamming code / Hamming / Parity bit / Forward error correction / Error detection and correction / Coding theory / Information theory

CHAPTER 15 ERROR CORRECTING CODES Insert this material after Chapter 13 (Gray Code) and after the new material on the

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2007-11-30 10:17:24
408Computational linguistics / Corpus linguistics / Part-of-speech tagging / Word-sense disambiguation / Error detection and correction / Tag / Linguistics / Natural language processing / Science

Correcting Errors in a New Gold Standard for Tagging Icelandic Text Sigrún Helgadóttir∗ , Hrafn Loftsson‡ , Eiríkur Rögnvaldsson† ∗ The Árni Magnússon Institute for Icelandic Studies, ‡ School of Computer

Add to Reading List

Source URL: www.lrec-conf.org

Language: English - Date: 2014-05-20 12:22:26
409Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
410Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
UPDATE