Error detection and correction

Results: 1767



#Item
571Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction

ODT Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-11-25 17:47:07
572Control flow / Computer errors / Exception handling / Error message / Fortran / Error detection and correction / Error / Error code / Computing / Software engineering / Computer programming

N IF Navigation and Ancillary Information Facility Exception Handling November 2014

Add to Reading List

Source URL: naif.jpl.nasa.gov

Language: English - Date: 2015-02-12 19:43:30
573Digital electronics / Computer memory / Backup / Fault-tolerant system / Computer data storage / Electronic engineering / Fault-tolerant design / Error detection and correction / Electronics / Computing / Data security / Fault-tolerant computer systems

This position paper was prepared for and distributed at the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, and published in Operating Systems Review 25, 1 (January, 1991), pages[removed]Thanks to J

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-03-21 12:36:02
574Telecommunications engineering / Information / Low-density parity-check code / Forward error correction / Turbo code / Reed–Solomon error correction / Error floor / Bit error rate / Noisy-channel coding theorem / Error detection and correction / Coding theory / Information theory

4-4 Transmission Experiments on OICETS Repeater Mode for Verification of Channel Coding Effect OKAMOTO Eiji, SHOJI Yozo, TOYOSHIMA Morio, and TAKAYAMA Yoshihisa In satellite-to-ground laser communication, the received op

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:12:35
575Digital audio / Numbers / Binary arithmetic / Error detection and correction / Parity / Parity bit / Syncword / Compact Disc / Data transmission / Telecommunications engineering / Electronics

Pollution is getting into Roebuck Bay through street drains, soil leaching & seepage from sewerage. Nutrients from fertilizer, gardens & septics help the algae LYNGBYA to grow and spread in Roebuck Bay, which is bad for

Add to Reading List

Source URL: www.roebuckbay.org.au

Language: English - Date: 2013-06-20 00:56:57
576Digital audio / Numbers / Binary arithmetic / Error detection and correction / Parity / Parity bit / Syncword / Compact Disc / Data transmission / Telecommunications engineering / Electronics

Appendix K: Original Level 1b Formats Valid to Sept. 8, 1992 The original formats of the Level 1b data before any enhancements were implemented are contained in this appendix. These formats are valid for Level 1b data

Add to Reading List

Source URL: www1.ncdc.noaa.gov

Language: English - Date: 2013-08-21 14:36:13
577Information / Modulation / Frequency-division multiple access / Multiplexing / Turbo code / Code division multiple access / Convolutional code / Channel access method / Forward error correction / Error detection and correction / OSI protocols / Telecommunications engineering

SATELLITE COMMUNICATIONS - INTERMEDIATE Presented by Professor Michael Frater, Dr Mark Pickering & Dr Michael Ryan This three-day course (incorporating our Satellite Communications—Overview short course as the first da

Add to Reading List

Source URL: bsu.unsw.adfa.edu.au

Language: English - Date: 2009-10-07 23:54:16
578Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
579Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
580Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
UPDATE