Works matching DE "INFORMATION storage %26 retrieval systems -- Code words"
Results: 45
VARIABLE-BRANCH TREE-STRUCTURED RESIDUAL VECTOR QUANTIZATION.
- Published in:
- International Journal of Image & Graphics, 2008, v. 8, n. 1, p. 61, doi. 10.1142/S0219467808002976
- By:
- Publication type:
- Article
Space-time block coded spatial modulation scheme enhanced by employing an intersymbol phase and power allocation.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 5, p. 3713, doi. 10.3906/elk-1606-144
- By:
- Publication type:
- Article
Code-based security with random interleaving.
- Published in:
- IET Communications (Wiley-Blackwell), 2017, v. 11, n. 8, p. 1195, doi. 10.1049/iet-com.2016.0303
- By:
- Publication type:
- Article
Simplified search and construction of capacity-approaching variable-length constrained sequence codes.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 14, p. 1697, doi. 10.1049/iet-com.2016.0077
- By:
- Publication type:
- Article
Low-density parity-check codes based on Galois fields.
- Published in:
- Journal of Communications Technology & Electronics, 2012, v. 57, n. 8, p. 857, doi. 10.1134/S1064226912080013
- By:
- Publication type:
- Article
Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping.
- Published in:
- Optical Engineering, 2011, v. 50, n. 9, p. 097402, doi. 10.1117/1.3622759
- By:
- Publication type:
- Article
SECURED INFORMATION HIDING THROUGH SHANNON-FANO-ELIAS CODING TECHNIQUE.
- Published in:
- International Journal on Intelligent Electronics Systems, 2016, v. 10, n. 1, p. 16, doi. 10.18000/ijies.30150
- By:
- Publication type:
- Article
Binary Tree Code Words as Context-Free Languages.
- Published in:
- Computer Journal, 1998, v. 41, n. 6, p. 422, doi. 10.1093/comjnl/41.6.422
- By:
- Publication type:
- Article
On the Data Expansion of the Huffman Compression Algorithm.
- Published in:
- Computer Journal, 1998, v. 41, n. 3, p. 137, doi. 10.1093/comjnl/41.3.137
- By:
- Publication type:
- Article
Determination of Sizes of Optimal Three-Dimensional Optical Orthogonal Codes of Weight Three with the AM-OPP Restriction.
- Published in:
- Journal of Combinatorial Designs, 2017, v. 25, n. 7, p. 310, doi. 10.1002/jcd.21550
- By:
- Publication type:
- Article
A Novel Object Detection Method Using Gaussian Mixture Codebook Model of RGB-D Information.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 45, p. 1, doi. 10.5013/IJSSST.a.17.45.40
- By:
- Publication type:
- Article
On codeword design in metric DNA spaces.
- Published in:
- Natural Computing, 2009, v. 8, n. 3, p. 571, doi. 10.1007/s11047-008-9088-6
- By:
- Publication type:
- Article
Code Words, Euphemisms and What They Can Tell Us About Cold War Anglo-American Communications Intelligence.
- Published in:
- Intelligence & National Security, 2012, v. 27, n. 6, p. 875, doi. 10.1080/02684527.2012.699288
- By:
- Publication type:
- Article
Coding Accounting Principles .
- Published in:
- Accounting Review, 1965, v. 40, n. 4, p. 742
- By:
- Publication type:
- Article
Structured root-LDPC codes and PEG-based techniques for block-fading channels.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2015, v. 2015, n. 1, p. 1, doi. 10.1186/s13638-015-0439-6
- By:
- Publication type:
- Article
Testing Whether a Set of Code Words Satisfies a Given Set of Constraints.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 2, p. 333
- By:
- Publication type:
- Article
HEATH CATALOG FOR 1910.
- Published in:
- Journal of Education, 1910, v. 72, n. 9, p. 242
- Publication type:
- Article
THE UNICODE STANDARD.
- Published in:
- Serials Review, 2000, v. 26, n. 2, p. 51, doi. 10.1016/S0098-7913(00)00059-9
- By:
- Publication type:
- Article
Quantum List Decoding of Classical Block Codes of Polynomially Small Rate from Quantumly Corrupted Codewords.
- Published in:
- Baltic Journal of Modern Computing, 2016, v. 4, n. 4, p. 753, doi. 10.22364/bjmc.2016.4.4.12
- By:
- Publication type:
- Article
LIST DECODING OF MATRIX-PRODUCT CODES FROM NESTED CODES: AN APPLICATION TO QUASI-CYCLIC CODES.
- Published in:
- Advances in Mathematics of Communications, 2012, v. 6, n. 3, p. 259, doi. 10.3934/amc.2012.6.259
- By:
- Publication type:
- Article
DNA Codeword Design: Theory and Applications.
- Published in:
- Parallel Processing Letters, 2014, v. 24, n. 2, p. -1, doi. 10.1142/S0129626414400015
- By:
- Publication type:
- Article
Reed-Solomon Code based Green & Survivable Communications Using Selective Encryption.
- Published in:
- International Journal of Performability Engineering, 2010, v. 6, n. 3, p. 297
- By:
- Publication type:
- Article
A code protection scheme by process memory relocation for android devices.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11137, doi. 10.1007/s11042-017-5363-9
- By:
- Publication type:
- Article
Landmark recognition with compact BoW histogram and ensemble ELM.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 5, p. 2839, doi. 10.1007/s11042-014-2424-1
- By:
- Publication type:
- Article
Uniform constant composition codes derived from repeated-root cyclic codes.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 3, p. 146, doi. 10.1049/el.2017.2008
- By:
- Publication type:
- Article
Orthogonality-based label correction in multi-class classification.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2013, v. 49, n. 12, p. 1, doi. 10.1049/el.2012.4408
- By:
- Publication type:
- Article
GENERATING (2,3)-CODES.
- Published in:
- Cybernetics & Systems Analysis / Kibernetiki i Sistemnyj Analiz, 2020, v. 56, n. 6, p. 12
- By:
- Publication type:
- Article
Estimating the fraction of erasure patterns correctable by linear codes.
- Published in:
- Journal of Communications Technology & Electronics, 2017, v. 62, n. 6, p. 669, doi. 10.1134/S106422691706002X
- By:
- Publication type:
- Article
Ternary Bradley-Terry model-based decoding for multi-class classification and its extensions.
- Published in:
- Machine Learning, 2011, v. 85, n. 3, p. 249, doi. 10.1007/s10994-011-5240-0
- By:
- Publication type:
- Article
Robust Visual Secret Sharing Scheme Applying to QR Code.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4036815
- By:
- Publication type:
- Article
On the Generality of Codebook Approach for Sensor-Based Human Activity Recognition.
- Published in:
- Electronics (2079-9292), 2017, v. 6, n. 2, p. x, doi. 10.3390/electronics6020044
- By:
- Publication type:
- Article
High-Rate Redundant Space-Time Coding.
- Published in:
- Journal of Electrical & Computer Engineering, 2010, p. 1, doi. 10.1155/2010/324138
- By:
- Publication type:
- Article
Iterative Signal Processing for Blind Code Phase Acquisition of CDMA 1x Signals for Radio Spectrum Monitoring.
- Published in:
- Journal of Electrical & Computer Engineering, 2010, p. 1, doi. 10.1155/2010/282493
- By:
- Publication type:
- Article
Efficient tree traversal to reduce code growth in tree-based genetic programming.
- Published in:
- Journal of Heuristics, 2009, v. 15, n. 1, p. 77, doi. 10.1007/s10732-007-9060-0
- By:
- Publication type:
- Article
Trajectory-based codes.
- Published in:
- Acta Informatica, 2004, v. 40, n. 6, p. 491, doi. 10.1007/s00236-004-0140-4
- By:
- Publication type:
- Article
A Low-Power Codeword-Based Viterbi Decoder with Fine-Grained Error Detection and Correction Techniques.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2018, v. 43, n. 2, p. 585, doi. 10.1007/s13369-017-2733-6
- By:
- Publication type:
- Article
Fault Leveling Techniques for Yield and Reliability Enhancement of NAND Flash Memories.
- Published in:
- Journal of Electronic Testing, 2018, v. 34, n. 5, p. 559, doi. 10.1007/s10836-018-5752-7
- By:
- Publication type:
- Article
Test Data Compression for System-on-a-Chip using Count Compatible Pattern Run-Length Coding.
- Published in:
- Journal of Electronic Testing, 2014, v. 30, n. 2, p. 237, doi. 10.1007/s10836-014-5441-0
- By:
- Publication type:
- Article
Efficient Test Compression Technique for SoC Based on Block Merging and Eight Coding.
- Published in:
- Journal of Electronic Testing, 2013, v. 29, n. 6, p. 849, doi. 10.1007/s10836-013-5415-7
- By:
- Publication type:
- Article
Performance Analysis of Ranging Process in Diversity Incorporated Wireless Systems Suffering from Narrowband Jamming.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 4, p. 2633, doi. 10.1007/s11277-013-1170-4
- By:
- Publication type:
- Article
OVSF Code Sharing and Reducing the Code Wastage Capacity in WCDMA.
- Published in:
- Wireless Personal Communications, 2009, v. 48, n. 4, p. 521, doi. 10.1007/s11277-008-9536-8
- By:
- Publication type:
- Article
Attacking Malicious Code: A Report to the Infosec Research Council.
- Published in:
- IEEE Software, 2000, v. 17, n. 5, p. 33, doi. 10.1109/52.877857
- By:
- Publication type:
- Article
( R, S)-Norm Information Measure and A Relation Between Coding and Questionnaire Theory.
- Published in:
- Open Systems & Information Dynamics (OSID), 2016, v. 23, n. 3, p. -1, doi. 10.1142/S1230161216500153
- By:
- Publication type:
- Article
Secret sharing schemes based on extension fields.
- Published in:
- European Journal of Pure & Applied Mathematics, 2018, v. 11, n. 2, p. 410
- By:
- Publication type:
- Article
Code Words in Political Discourse.
- Published in:
- Philosophical Topics, 2017, v. 45, n. 2, p. 33, doi. 10.5840/philtopics201745213
- By:
- Publication type:
- Article