Cryptography, Information Theory, and Error‐Correction最新文献

筛选
英文 中文
Source Coding, Redundancy 源编码、冗余
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch11
{"title":"Source Coding, Redundancy","authors":"","doi":"10.1002/9781119582397.ch11","DOIUrl":"https://doi.org/10.1002/9781119582397.ch11","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compression and Applications 压缩和应用
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch17
{"title":"Compression and Applications","authors":"","doi":"10.1002/9781119582397.ch17","DOIUrl":"https://doi.org/10.1002/9781119582397.ch17","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Appendix A 附录A
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.app1
{"title":"Appendix A","authors":"","doi":"10.1002/9781119582397.app1","DOIUrl":"https://doi.org/10.1002/9781119582397.app1","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyclic Linear Codes, Shift Registers, and CRC 循环线性码,移位寄存器和CRC
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch21
{"title":"Cyclic Linear Codes, Shift Registers, and CRC","authors":"","doi":"10.1002/9781119582397.ch21","DOIUrl":"https://doi.org/10.1002/9781119582397.ch21","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error‐Correction, Hadamard, and Bruen–Ott 错误校正,Hadamard和Bruen-Ott
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch18
{"title":"Error‐Correction, Hadamard, and Bruen–Ott","authors":"","doi":"10.1002/9781119582397.ch18","DOIUrl":"https://doi.org/10.1002/9781119582397.ch18","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Identities for the Shannon Function with Applications 香农函数的新恒等式及其应用
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch25
{"title":"New Identities for the Shannon Function with Applications","authors":"","doi":"10.1002/9781119582397.ch25","DOIUrl":"https://doi.org/10.1002/9781119582397.ch25","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Glossary 术语表
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.gloss
{"title":"Glossary","authors":"","doi":"10.1002/9781119582397.gloss","DOIUrl":"https://doi.org/10.1002/9781119582397.gloss","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signals, Sampling, Coding Gain, Shannon's Information Capacity Theorem 信号,采样,编码增益,香农信息容量定理
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch13
{"title":"Signals, Sampling, Coding Gain, Shannon's Information Capacity Theorem","authors":"","doi":"10.1002/9781119582397.ch13","DOIUrl":"https://doi.org/10.1002/9781119582397.ch13","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"392 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116667639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain and Bitcoin 区块链和比特币
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch26
Kevin W. Jennings, S. Scheidt
{"title":"Blockchain and Bitcoin","authors":"Kevin W. Jennings, S. Scheidt","doi":"10.1002/9781119582397.ch26","DOIUrl":"https://doi.org/10.1002/9781119582397.ch26","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
In the Cloud 在云端
Cryptography, Information Theory, and Error‐Correction Pub Date : 2021-07-14 DOI: 10.1002/9781119582397.ch28
Timothy M. Laseter, Alyssa Coughenour, Jane Webb
{"title":"In the Cloud","authors":"Timothy M. Laseter, Alyssa Coughenour, Jane Webb","doi":"10.1002/9781119582397.ch28","DOIUrl":"https://doi.org/10.1002/9781119582397.ch28","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信