Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Detection codes“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Detection codes" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Detection codes"
Alekseev, Maksim. „On Strengthening of Weak Algebraic Manipulation Detection Codes“. International Journal of Embedded and Real-Time Communication Systems 6, Nr. 2 (April 2015): 1–26. http://dx.doi.org/10.4018/ijertcs.2015040101.
Der volle Inhalt der QuelleCramer, Ronald, Serge Fehr und Carles Padró. „Algebraic manipulation detection codes“. Science China Mathematics 56, Nr. 7 (Juli 2013): 1349–58. http://dx.doi.org/10.1007/s11425-013-4654-5.
Der volle Inhalt der QuelleFord, Elizabeth, John A. Carroll, Helen E. Smith, Donia Scott und Jackie A. Cassell. „Extracting information from the text of electronic medical records to improve case detection: a systematic review“. Journal of the American Medical Informatics Association 23, Nr. 5 (05.02.2016): 1007–15. http://dx.doi.org/10.1093/jamia/ocv180.
Der volle Inhalt der QuelleDas, P. K. „Codes on Key Errors“. Cybernetics and Information Technologies 14, Nr. 2 (15.07.2014): 31–37. http://dx.doi.org/10.2478/cait-2014-0017.
Der volle Inhalt der QuelleChen, Chaofan, Li Li, Li Wang, Shuai Wang, Xiangming Li und George K. Karagiannidis. „Noncoherent Detection With Polar Codes“. IEEE Access 7 (2019): 6362–72. http://dx.doi.org/10.1109/access.2018.2889498.
Der volle Inhalt der QuelleKlove, T. „Optimal codes for error detection“. IEEE Transactions on Information Theory 38, Nr. 2 (März 1992): 479–89. http://dx.doi.org/10.1109/18.119708.
Der volle Inhalt der QuelleCondo, Carlo, Seyyed Ali Hashemi und Warren J. Gross. „Blind Detection With Polar Codes“. IEEE Communications Letters 21, Nr. 12 (Dezember 2017): 2550–53. http://dx.doi.org/10.1109/lcomm.2017.2748940.
Der volle Inhalt der QuelleGuo, Ying, und Guihua Zeng. „Quantum Event-Error Detection Codes“. Journal of the Physical Society of Japan 74, Nr. 11 (15.11.2005): 2949–56. http://dx.doi.org/10.1143/jpsj.74.2949.
Der volle Inhalt der QuelleSiddharth, A. „Error detection in numeric codes“. Resonance 17, Nr. 7 (Juli 2012): 653–71. http://dx.doi.org/10.1007/s12045-012-0070-3.
Der volle Inhalt der QuelleShutao, Xia, und Fu Fangwei. „Combinatorial codes for error detection“. Acta Mathematicae Applicatae Sinica 15, Nr. 4 (Oktober 1999): 444–46. http://dx.doi.org/10.1007/bf02684046.
Der volle Inhalt der QuelleDissertationen zum Thema "Detection codes"
Xu, Danfeng. „Iterative coded multiuser detection using LDPC codes“. Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27939.
Der volle Inhalt der QuelleSchiffel, Ute. „Hardware Error Detection Using AN-Codes“. Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-69872.
Der volle Inhalt der QuelleXiao, Jiaxi. „Information theoretic approach in detection and security codes“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.
Der volle Inhalt der QuelleGu, Yu. „Noncoherent communications using space-time trellis codes“. Thesis, University of Canterbury. Electrical and Computer Engineering, 2008. http://hdl.handle.net/10092/1252.
Der volle Inhalt der QuelleKatz, Ettie. „Trellis codes for multipath fading ISI channels with sequential detection“. Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/13908.
Der volle Inhalt der QuelleOruç, Özgür Altınkaya Mustafa Aziz. „Differential and coherent detection schemes for space-time block codes/“. [s.l.]: [s.n.], 2002. http://library.iyte.edu.tr/tezler/master/elektrikveelektronikmuh/T000133.pdf.
Der volle Inhalt der QuelleKnopp, Raymond. „Module-phase-codes with non-coherent detection and reduced-complexity decoding“. Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=68034.
Der volle Inhalt der QuelleValenti, Matthew C. „Iterative Detection and Decoding for Wireless Communications“. Diss., Virginia Tech, 1999. http://hdl.handle.net/10919/28290.
Der volle Inhalt der QuellePh. D.
Xu, Chang. „Inconsistency detection and resolution for context-aware pervasive computing /“. View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XU.
Der volle Inhalt der QuelleAlbayrak, Aras. „Automatic Pose and Position Estimation by Using Spiral Codes“. Thesis, Högskolan i Halmstad, Halmstad Embedded and Intelligent Systems Research (EIS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27175.
Der volle Inhalt der QuelleBücher zum Thema "Detection codes"
Kløve, Torleiv. Codes for error detection. Singapore: World Scientific, 2007.
Den vollen Inhalt der Quelle findenGössel, Michael. Error detection circuits. London: McGraw-Hill, 1993.
Den vollen Inhalt der Quelle findenCrow, Judy. Model-based reconfiguration: Diagnosis and recovery. Hampton, Va: National Aeronautics and Space Administration, Langley Research Center, 1994.
Den vollen Inhalt der Quelle findenLeacock, Claudia. Automated grammatical error detection for language learners. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2010.
Den vollen Inhalt der Quelle findenThompson, Michael W. Concatenated coding using trellis-coded modulation: Final report : NAG 9-767. [Washington, DC: National Aeronautics and Space Administration, 1997.
Den vollen Inhalt der Quelle findenFreeman, Jon C. Introduction to forward-error-correcting coding. Washington D.C: NationalAeronautics and Space Administration, Office of Management, Scientific and Technical Information Branch, 1996.
Den vollen Inhalt der Quelle findenFreeman, Jon C. Introduction to forward-error-correcting coding. Cleveland, Ohio: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1996.
Den vollen Inhalt der Quelle findenFreeman, Jon C. Introduction to forward-error-correcting coding. Cleveland, Ohio: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1996.
Den vollen Inhalt der Quelle findenFreeman, Jon C. Introduction to forward-error-correcting coding. Cleveland, Ohio: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1996.
Den vollen Inhalt der Quelle findenKløve, Torleiv, und Valery I. Korzhik. Error Detecting Codes. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-1-4615-2309-3.
Der volle Inhalt der QuelleBuchteile zum Thema "Detection codes"
Gonzalez, Diego L. „Error Detection and Correction Codes“. In Biosemiotics, 379–94. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-6340-4_17.
Der volle Inhalt der QuelleWu, Zining. „Turbo Codes and Turbo Equalization“. In Coding and Iterative Detection for Magnetic Recording Channels, 21–46. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4565-1_2.
Der volle Inhalt der QuelleWu, Zining. „Low-Density Parity-Check Codes“. In Coding and Iterative Detection for Magnetic Recording Channels, 47–69. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4565-1_3.
Der volle Inhalt der QuelleElkhadir, Zyad, Khalid Chougdali und Mohammed Benattou. „A Median Nearest Neighbors LDA for Anomaly Network Detection“. In Codes, Cryptology and Information Security, 128–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55589-8_9.
Der volle Inhalt der QuelleJafargholi, Zahra, und Daniel Wichs. „Tamper Detection and Continuous Non-malleable Codes“. In Theory of Cryptography, 451–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46494-6_19.
Der volle Inhalt der QuelleWu, Zining. „Interleaved Parity Check Codes and Reduced Complexity Detection“. In Coding and Iterative Detection for Magnetic Recording Channels, 103–17. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4565-1_5.
Der volle Inhalt der QuelleLugiez, Denis. „Multivariate polynomial factoring and detection of true factors“. In Applied Algebra, Algorithmics and Error-Correcting Codes, 169–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/3-540-16767-6_62.
Der volle Inhalt der QuelleMethods, Algebraic, und F. S. Vainstein. „Error detection and correction in numerical computations“. In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 456–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54522-0_133.
Der volle Inhalt der QuelleLin, Fuchun, Reihaneh Safavi-Naini und Pengwei Wang. „Codes for Detection of Limited View Algebraic Tampering“. In Information Security and Cryptology, 309–20. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54705-3_19.
Der volle Inhalt der QuellePintus, Maurizio. „Analysis of Neural Codes for Near-Duplicate Detection“. In Advanced Concepts for Intelligent Vision Systems, 357–68. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01449-0_30.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Detection codes"
Giard, Pascal, Alexios Balatsoukas-Stimming und Andreas Burg. „Blind detection of polar codes“. In 2017 IEEE International Workshop on Signal Processing Systems (SiPS). IEEE, 2017. http://dx.doi.org/10.1109/sips.2017.8109977.
Der volle Inhalt der QuellePicard, Justin, Paul Landry und Michael Bolay. „Counterfeit detection with QR codes“. In DocEng '21: ACM Symposium on Document Engineering 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3469096.3474924.
Der volle Inhalt der QuelleQi, Gang, Xiaoli Yang und Wei Fan. „LDPC codes in wireless optical communication application“. In ISPDI 2013 - Fifth International Symposium on Photoelectronic Detection and Imaging, herausgegeben von Keith E. Wilson, Jing Ma, Liren Liu, Huilin Jiang und Xizheng Ke. SPIE, 2013. http://dx.doi.org/10.1117/12.2031610.
Der volle Inhalt der QuelleSobron, Iker, Maitane Barrenechea, Pello Ochandiano, Lorena Martinez, Mikel Mendicute und Jon Altuna. „Low-complexity detection of golden codes in LDPC-coded OFDM systems“. In ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011. http://dx.doi.org/10.1109/icassp.2011.5946692.
Der volle Inhalt der QuelleArslan, Suayb S., Jaewook Lee und Turguy Goker. „Embedding Noise Prediction Into List-Viterbi Decoding Using Error Detection Codes for Magnetic Tape Systems“. In ASME 2013 Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/isps2013-2835.
Der volle Inhalt der QuelleNaydenova, Irina, und Torleiv Klove. „Large proper codes for error detection“. In 2006 IEEE Information Theory Workshop - ITW '06 Chengdu. IEEE, 2006. http://dx.doi.org/10.1109/itw2.2006.323781.
Der volle Inhalt der QuelleZhen Wang, Mark Karpovsky und Berk Sunar. „Multilinear codes for robust error detection“. In 2009 15th IEEE International On-Line Testing Symposium (IOLTS 2009). IEEE, 2009. http://dx.doi.org/10.1109/iolts.2009.5196002.
Der volle Inhalt der QuellePingping Shang, Sooyoung Kim und Kwonhue Choi. „Soft ZF MIMO detection for turbo codes“. In 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2010. http://dx.doi.org/10.1109/wimob.2010.5644980.
Der volle Inhalt der QuelleRen, Xiaofeng, und Deva Ramanan. „Histograms of Sparse Codes for Object Detection“. In 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2013. http://dx.doi.org/10.1109/cvpr.2013.417.
Der volle Inhalt der QuelleMoon, J. J., und L. R. Carley. „Sequeuce detection on run-length-limited codes“. In Twenty-Third Asilomar Conference on Signals, Systems and Computers, 1989. IEEE, 1989. http://dx.doi.org/10.1109/acssc.1989.1200834.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Detection codes"
Wolf, Jack K. A Study of Error Detection and Correction Codes. Fort Belvoir, VA: Defense Technical Information Center, September 1985. http://dx.doi.org/10.21236/ada162196.
Der volle Inhalt der QuelleHeinstein, M. W., S. W. Attaway, J. W. Swegle und F. J. Mello. A general-purpose contact detection algorithm for nonlinear structural analysis codes. Office of Scientific and Technical Information (OSTI), Mai 1993. http://dx.doi.org/10.2172/10175733.
Der volle Inhalt der QuelleMay, Elebeoba Eni, Mark Daniel Rintoul, Anna Marie Johnston, Richard J. Pryor, William Eugene Hart und Jean-Paul Watson. Detection and reconstruction of error control codes for engineered and biological regulatory systems. Office of Scientific and Technical Information (OSTI), Oktober 2003. http://dx.doi.org/10.2172/918239.
Der volle Inhalt der QuelleViterbi, Andrew J., Jack K. Wolf, Lyle J. Fredrickson, Jeff A. Levin und Robert D. Blakeney. Research in Mathematics and Computer Science: Calculation of the Probability of Undetected Error for Certain Error Detection Codes. Phase 2. Fort Belvoir, VA: Defense Technical Information Center, Mai 1991. http://dx.doi.org/10.21236/ada238234.
Der volle Inhalt der QuelleCrawford, R., P. Kerchen, K. Levitt, R. Olsson, M. Archer und M. Casillas. Automated assistance for detecting malicious code. Office of Scientific and Technical Information (OSTI), Juni 1993. http://dx.doi.org/10.2172/10176903.
Der volle Inhalt der QuelleSpielman, R. X-Ray Detector: An x-ray radiation detector design code. Office of Scientific and Technical Information (OSTI), April 1990. http://dx.doi.org/10.2172/6908044.
Der volle Inhalt der QuelleShaver, Mark W., Andrew M. Casella, Richard S. Wittman und John W. Hayes. Evaluation and Testing of the ADVANTG Code on SNM Detection. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1096695.
Der volle Inhalt der QuelleGentry, S. M. Detection optimization using linear systems analysis of a coded aperture laser sensor system. Office of Scientific and Technical Information (OSTI), September 1994. http://dx.doi.org/10.2172/10187583.
Der volle Inhalt der QuelleNeogi, Orgho. Search for Dark Matter in a Coannihilation Codex Model With CMS Detector. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1496031.
Der volle Inhalt der QuelleWen, Qingsong, Minzhen Ren und Xiaoli Ma. Fixed-point Design of the Lattice-reduction-aided Iterative Detection and Decoding Receiver for Coded MIMO Systems. Fort Belvoir, VA: Defense Technical Information Center, Januar 2011. http://dx.doi.org/10.21236/ada586964.
Der volle Inhalt der Quelle