Error detection and correction

Results: 1767



#Item
771Information / Data / Convolutional code / Walsh–Hadamard code / Code division multiple access / Forward error correction / Concatenated error correction code / Block code / Symbol rate / Coding theory / Error detection and correction / Telecommunications engineering

Iterative Multi-User Detection and Decoding for DS-CDMA System with SpaceTime Linear Dispersion Pei Xiao† , Member, IEEE, Jinsong Wu†† , Member, IEEE, Mathini Sellathurai† , Senior Member, IEEE, T. Ratnarajah†

Add to Reading List

Source URL: epubs.surrey.ac.uk

Language: English - Date: 2013-09-23 15:18:20
772Search algorithms / Information retrieval / Computing / Cryptographic hash functions / Hash function / Hash join / Relational database / Trie / Join / Hashing / Data management / Error detection and correction

APPLYING HASH FILTERS TO IMPROVING EXECUTION OF BUSHY TREES

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:13:59
773Mathematics / Error detection and correction / Finite fields / Invariant theory / Enumerator polynomial / Cyclic code / Molien series / Quadratic residue code / BCH code / Coding theory / Abstract algebra / Algebra

794 IEEETRANSACTIONS [I41 T. Kasami, S. Lin, and W. W. Peterso?,.“New generalizations of the Reed-Muller codes-Part I: Pritnltlve codes,” IEEE Trans.

Add to Reading List

Source URL: neilsloane.com

Language: English - Date: 2012-04-16 01:14:54
774Graphics file formats / Wavelets / Data / JPEG / Data transmission / Data link layer / Image compression / Network packet / Error detection and correction / Computing / ISO standards / Information

Data hiding error concealment for JPEG2000 images.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:31
775Search algorithms / Error detection and correction / Hash function

SAS-Webinar[removed]Freitagsveranstaltung SAS 9.3

Add to Reading List

Source URL: www.sas.com

Language: English - Date: 2014-10-02 15:45:49
776National security / Security / Error detection and correction / Computer security

Consistency Under Deception Implies Integrity From Fred Cohen & Associates - Analyst Report and Newsletter Consistency analysis has been found useful in detecting corruptions of all sorts, ranging from accidental bit fli

Add to Reading List

Source URL: www.all.net

Language: English - Date: 2013-07-10 14:09:34
777Multiplexing / Code / Telecommunications engineering / Information / Data / Radio resource management / Error detection and correction / Code division multiple access

Microsoft Word - Document1

Add to Reading List

Source URL: dspace.unimap.edu.my

Language: English - Date: 2014-09-02 04:02:23
778Theoretical computer science / Applied mathematics / Mathematics / Finite fields / Information theory / Error detection and correction / Los Angeles Unified School District / IP / Coding theory

Board of Trustees Report Southwest College December 3, 2008 Infrastructure Committee

Add to Reading List

Source URL: www.laccd.edu

Language: English - Date: 2015-01-20 14:57:50
779Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.organicdesign.co.nz

Language: English - Date: 2011-06-18 04:34:18
780Cryptography / Data management / Cryptographic hash functions / Error detection and correction / Checksum / Hash list / Inode / File system / Hash function / Computing / Disk file systems / Hashing

Enhancing File System Integrity Through Checksums Gopalan Sivathanu, Charles P. Wright, and Erez Zadok Stony Brook University Technical Report FSL-04-04

Add to Reading List

Source URL: www.fsl.cs.sunysb.edu

Language: English - Date: 2012-09-07 11:07:01
UPDATE