Academic literature on the topic 'Code Unknown'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Code Unknown.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Code Unknown"
Waldby, Catherine. "Code Unknown." Social Studies of Science 31, no. 5 (October 2001): 779–91. http://dx.doi.org/10.1177/030631201031005005.
Full textKruh, Louis. "SLIDING CODE DEVICE OF UNKNOWN ORIGIN." Cryptologia 16, no. 1 (January 1992): 86–88. http://dx.doi.org/10.1080/0161-119291866793.
Full textLai, Yingxu, and Zhenghui Liu. "Unknown Malicious Code Detection Based on Bayesian." Procedia Engineering 15 (2011): 3836–42. http://dx.doi.org/10.1016/j.proeng.2011.08.718.
Full textCarrier, Kevin, and Jean-Pierre Tillich. "Identifying an unknown code by partial Gaussian elimination." Designs, Codes and Cryptography 87, no. 2-3 (December 21, 2018): 685–713. http://dx.doi.org/10.1007/s10623-018-00593-7.
Full textTsai, Wen-Hsuan, and Peng-Hsiang Kao. "Secret Codes of Political Propaganda: The Unknown System of Writing Teams." China Quarterly 214 (May 13, 2013): 394–410. http://dx.doi.org/10.1017/s0305741013000362.
Full textInterlando, J. Carmelo. "Decoding the Ternary (23, 11, 9) Quadratic Residue Code." Research Letters in Communications 2009 (2009): 1–3. http://dx.doi.org/10.1155/2009/107432.
Full textHartanto, Ari Dwi, and Al Sutjijana. "Binary Cyclic Pearson Codes." Jurnal Matematika MANTIK 7, no. 1 (March 18, 2021): 1–8. http://dx.doi.org/10.15642/mantik.2021.7.1.1-8.
Full textHiggott, Oscar, Matthew Wilson, James Hefford, James Dborin, Farhan Hanif, Simon Burton, and Dan E. Browne. "Optimal local unitary encoding circuits for the surface code." Quantum 5 (August 5, 2021): 517. http://dx.doi.org/10.22331/q-2021-08-05-517.
Full textFang-Biau Ueng, Jun-Da Chen, and Shang-Chun Tsai. "Adaptive DS-CDMA Receiver with Code Tracking in Phase Unknown Environments." IEEE Transactions on Wireless Communications 7, no. 4 (April 2008): 1227–35. http://dx.doi.org/10.1109/twc.2008.060803.
Full textAHMED, PERVEZ, and C. Y. SUEN. "COMPUTER RECOGNITION OF TOTALLY UNCONSTRAINED HANDWRITTEN ZIP CODES." International Journal of Pattern Recognition and Artificial Intelligence 01, no. 01 (April 1987): 1–15. http://dx.doi.org/10.1142/s0218001487000023.
Full textDissertations / Theses on the topic "Code Unknown"
Savari, Serap Ayĩe. "Variable-to-fixed length codes for sources with known and unknown memory." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/11286.
Full textIncludes bibliographical references (leaves 91-93).
by Serap AyÅe Savari.
Ph.D.
Koizumi, Kaori. "The unknown core of existence : representations of the self in the novels of Haruki Murakami." Thesis, University of Essex, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.395919.
Full textMestrah, Yasser. "Systèmes de communication robustes dans des environnements inconnus An unsupervised llr estimation with unknown noise distribution." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS026.
Full textFuture networks will become more dense and heterogeneous due to the inevitable increase in the number of communicated devices and the coexistence of numerous independent networks. One of the consequences is the significant increase in interference. Many studies have shown the impulsive nature of such an interference that is characterized by the presence of high amplitudes during short time durations. In fact, this undesirable phenomenon cannot be captured by the Gaussian model but more properly by heavy-tailed distributions. Beyond networks, impulsive noises are also found in other contexts. They can be generated naturally or be man-made. Systems lose their robustness when the environment changes, as the design takes too much into account the specificities of the model. The problem is that most of the communication systems implemented are based on the Gaussian assumption.Several techniques have been developed to limit the impact of interference, such as interference alignment at the physical layer or simultaneous transmission avoidance techniques like CSMA at the MAC layer. Finally, other methods try to suppress them effectively at the receiver as the successive interference cancellation (SIC). However, all these techniques cannot completely cancel interference. This is all the more true sincewe are heading towards dense networks such as LoRa, Sigfox, 5G or in general the internet of things (IoT) networks without centralized control or access to theradio resources or emission powers. Therefore, taking into account the presence of interference at the receiver level becomes a necessity, or even an obligation.Robust communication is necessary and making a decision at the receiver requires an evaluation of the log-likelihood ratio (LLR), whose derivation depends on the noise distribution. In the presence of additive white Gaussian noise (AWGN) the performance of digital communication schemes has been widely studied, optimized and simply implemented thanks to the linear-based receiver. In impulsive noise, the LLR is not linear anymore and it is computationally prohibitive or even impossible when the noise distribution is not known. Besides, the traditional linear behaviour of the optimal receiver exhibits a significant performance loss. In this study, we focus on designing a simple, adaptive and robust receiver that exhibits a near-optimal performance over Gaussian and non-Gaussian environments. The receiver must strive for universality by adapting automatically and without assistance in real conditions.We prove in this thesis that a simple module between the channel output and the decoder input allows effectively to combat the noise and interference that disrupt point-to-point (P2P) communications in a network. This module can be used as a front end of any LLR-based decoder and it does not require the knowledge of the noise distribution including both thermal noise and interference. This module consists of a LLR approximation selected in a parametric family of functions, flexible enough to be able to represent many communication contexts (Gaussian or non-Gaussian).Then, the judicious use of an information theory criterion allows to search effectively for the LLR approximation function that matches the channel state. Two different methods are proposed and investigated for this search, either using supervised learning or with an unsupervised approach. We show that it is even possible to use such a scheme for short packet communications with a performance close to the true LLR, which is computationally prohibitive. Overall, we believe that our findings can significantly contribute to many communication scenarios and will be desired in different networks wireless or wired, point to point or dense networks
Wu, Yi-Lun, and 吳依倫. "Unknown Word Extraction fromMultilingual Code-Switched Sentences." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/08909589562461278018.
Full text元智大學
資訊管理學系
99
Unknown word extraction plays an important rule in the field of Chinese language analysis. Several short terms of compound language are not available in dictionary up to now, and affect the result of Chinese word segmentation. This research focuses on extracting unknown words from code-Switched sentences, especially for “short term”. This research provides several approaches for comparison and examination as follows. My research primarily uses the Pointwise Mutual Information(PMI) to calculate the relationship between two different terms, and PMI would choose bigger value as the candidate. Although PMI only accept nearby words by appearance frequency, Besides PMI, I sieve out new words on all sides more precisely by entropy of sentence meaning.
Perry, Patrick. "The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel." Thesis, 2007. http://hdl.handle.net/10125/20564.
Full textSilvey, Vivien. "Network Films: a Global Genre?" Phd thesis, 2012. http://hdl.handle.net/1885/10535.
Full textChang, Tsung-Hui, and 張縱輝. "Maximum-Likelihood Detection of Orthogonal Space-Time Block Coded OFDM in Unknown Block Fading Channels." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/68990826625155438466.
Full text國立清華大學
通訊工程研究所
96
現存大多數針對正交空時區塊碼正交分頻多工(orthogonal space-time block coded orthogonal frequency division multiplexing, OSTBC-OFDM)系統的盲蔽檢測與通道估測技術皆基於一根本假設,通道(channel)在多個OSTBC-OFDM區塊區間內為靜止不變的。本論文考量只需使用一個OSTBC-OFDM區塊信號之盲蔽最大勢然檢測(maximum-likelihood (ML) detection)技術。此技術的優點在於其更適合應用於具有較短同調時間(coherence time)的通道環境。基於BPSK/QPSK符碼調變,我們探討包括接收機實現(receiver implementation)及盲蔽唯一資料鑑別(blind unique data identifiability)的問題。對於接收機實現問題,我們提出降底複雜度的子通道群組(subchannel grouping)檢測機制。對於盲蔽唯一資料鑑別,我們證明所提出的檢偵機制在獨立瑞立衰減通道(Rayleigh fading channels)中只需使用非常少量的前導資料(pilot data)就能保證資料鑑別的唯一性。 本論文的第二部分更進一步針對任意非全零的通道環境,發展能夠在盲蔽接收機唯一鑑別通道的傳輸機制,我們證之為「完美之通道鑑別」(perfect channel identifiability, PCI)機制。我們證明只要使用所謂的子空間無交集碼(nonintersecting subspace codes)就能達到所期望的完美通道鑑別。此外,我們分析證明在獨立瑞立衰減通道中,此完美之通道鑑別傳輸機制能夠保證盲蔽最大勢然檢測器獲得最大之空間分集增益(spatial diversity gain)。最後,我們將所提出的完美之通道鑑別傳輸機制以及所提出之盲蔽最大勢然檢測器延伸到分散式空時編碼(distributed space time coding)系統。
Books on the topic "Code Unknown"
Walker, Elsie. Code Unknown. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190495909.003.0005.
Full textHaneke, Michael. Code inconnu, récit incomplet de divers voyages: Code unknown. 2015.
Find full textThe Unknown Twin: Code Red, Harlequin Super Romance - 1206. Harlequin, 2004.
Find full textInstitute, Pennsylvania Bar, ed. The new Internal Revenue Code Section 409A: The known and unknown consequences for your clients. [Mechanicsburg, Pa.]: Pennsylvania Bar Institute, 2008.
Find full textX, Trader. Forex Trading Secrets : Little Dirty Secrets And Unknown But Crazy Profitable Tricks To Breaking The Forex Code And Easy Instant Forex Millionaire: ... Cycle, Live Anywhere, Join The New Rich. CreateSpace Independent Publishing Platform, 2014.
Find full textX, Trader. About Day Trading : Unknown Hidden Secrets and Weird Dirty But Profitable Tricks To Cracking The Code To Striking It Rich With Forex: The Four Hour Forex, Escape 9-5, Live Anywhere, Join The New Rich. CreateSpace Independent Publishing Platform, 2015.
Find full textKatelouzou, Dionysia, and Dan W. Puchniak, eds. Global Shareholder Stewardship. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781108914819.
Full textCogliati Dezza, Irene, Eric Schulz, and Charley M. Wu, eds. The Drive for Knowledge. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781009026949.
Full textBen-Haim, Yakov. Uncertainty, Ignorance, Surprise—The Endless Frontier. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198822233.003.0003.
Full textZimansky, Paul. Urartian and the Urartians. Edited by Gregory McMahon and Sharon Steadman. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780195376142.013.0024.
Full textBook chapters on the topic "Code Unknown"
Fujii, Yoichi Robertus. "Encounter with the Unknown." In The MicroRNA Quantum Code Book, 65–78. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-8586-7_7.
Full textZhang, Boyun, Jianping Yin, and Jingbo Hao. "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code." In Fuzzy Systems and Knowledge Discovery, 629–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11539506_78.
Full textJamrozik, Żaneta. "Acting as Value: Juliette Binoche in Michael Haneke’S Code Unknown." In Work in Cinema, 91–110. New York: Palgrave Macmillan US, 2013. http://dx.doi.org/10.1057/9781137370860_5.
Full textCohen, Joshua M., Qinshi Wang, and Andrew W. Appel. "Verified Erasure Correction in Coq with MathComp and VST." In Computer Aided Verification, 272–92. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_14.
Full textFukui, Hideo. "Land Plots with Unknown Owners: Causes and Legal Measures—The Necessity for a Thorough Reduction of Transaction Costs." In New Frontiers in Regional Science: Asian Perspectives, 31–62. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_4.
Full textLykidis, Alex. "Multiculturalism as Class Trauma: Antagonistic Authorship in Caché, Code Unknown, Happy End and Time of the Wolf." In Art Cinema and Neoliberalism, 211–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61006-7_6.
Full textFukui, Hideo. "Real Estate and the Legal System of Japan." In New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.
Full textPalit, Sarbani, and Bimal K. Roy. "Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function." In Advances in Cryptology - ASIACRYPT’99, 306–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48000-6_25.
Full textLamprakos, Christos P., Charalampos Marantos, Lazaros Papadopoulos, and Dimitrios Soudris. "The Known Unknowns: Discovering Trade-Offs Between Heterogeneous Code Changes." In Lecture Notes in Computer Science, 342–53. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04580-6_23.
Full textLamprakos, Christos P., Charalampos Marantos, Lazaros Papadopoulos, and Dimitrios Soudris. "The Known Unknowns: Discovering Trade-Offs Between Heterogeneous Code Changes." In Lecture Notes in Computer Science, 342–53. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04580-6_23.
Full textConference papers on the topic "Code Unknown"
Lee, Jaehee, Hyoungjun Kim, Hyunsik Yoon, and Kyungho Lee. "How to detect unknown malicious code efficiently?" In 2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, 2015. http://dx.doi.org/10.1109/cccs.2015.7374162.
Full textTillich, Jean-Pierre, Audrey Tixier, and Nicolas Sendrier. "Recovering the interleaver of an unknown turbo-code." In 2014 IEEE International Symposium on Information Theory (ISIT). IEEE, 2014. http://dx.doi.org/10.1109/isit.2014.6875341.
Full textTixier, Audrey. "Blind identification of an unknown interleaved convolutional code." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282419.
Full textTahmasbi, Mehrdad, and Matthieu R. Bloch. "Covert Communication with Unknown Code at the Warden." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919792.
Full textGiese and Skoglund. "Space-time code design for unknown frequency-selective channels." In IEEE International Conference on Acoustics Speech and Signal Processing ICASSP-02. IEEE, 2002. http://dx.doi.org/10.1109/icassp.2002.1005171.
Full textGiese, Jochen, and Mikael Skoglund. "Space-time code design for unknown frequency-selective channels." In Proceedings of ICASSP '02. IEEE, 2002. http://dx.doi.org/10.1109/icassp.2002.5745133.
Full textNegara, Stas, Mihai Codoban, Danny Dig, and Ralph E. Johnson. "Mining fine-grained code changes to detect unknown change patterns." In ICSE '14: 36th International Conference on Software Engineering. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2568225.2568317.
Full textBellard, Marion, and Jean-Pierre Tillich. "Detecting and reconstructing an unknown convolutional code by counting collisions." In 2014 IEEE International Symposium on Information Theory (ISIT). IEEE, 2014. http://dx.doi.org/10.1109/isit.2014.6875378.
Full textHou, Yu, Cong Tran, and Won-Yong Shin. "META-CODE: Community Detection via Exploratory Learning in Topologically Unknown Networks." In CIKM '22: The 31st ACM International Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3511808.3557639.
Full textKim, Hayoung, Junho Choi, Dongjin Choi, Hansuk Choi, and Pankoo Kim. "Detection of unknown malicious script code using a conceptual graph and SVM." In the 2012 ACM Research in Applied Computation Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2401603.2401671.
Full textReports on the topic "Code Unknown"
Knight, R. D., and H. A. J. Russell. Quantifying the invisible: pXRF analyses of three boreholes, British Columbia and Ontario. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/331176.
Full textBridges, Todd, Sandra Newell, Alan Kennedy, David Moore, Upal Ghosh, Trevor Needham, Huan Xia, Kibeum Kim, Charles Menzie, and Konrad Kulacki. Long-term stability and efficacy of historic activated carbon (AC) deployments at diverse freshwater and marine remediation sites. Engineer Research and Development Center (U.S.), November 2020. http://dx.doi.org/10.21079/11681/38781.
Full textHart, Carl R., D. Keith Wilson, Chris L. Pettit, and Edward T. Nykaza. Machine-Learning of Long-Range Sound Propagation Through Simulated Atmospheric Turbulence. U.S. Army Engineer Research and Development Center, July 2021. http://dx.doi.org/10.21079/11681/41182.
Full textKing, E. L., A. Normandeau, T. Carson, P. Fraser, C. Staniforth, A. Limoges, B. MacDonald, F. J. Murrillo-Perez, and N. Van Nieuwenhove. Pockmarks, a paleo fluid efflux event, glacial meltwater channels, sponge colonies, and trawling impacts in Emerald Basin, Scotian Shelf: autonomous underwater vehicle surveys, William Kennedy 2022011 cruise report. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/331174.
Full textSchuster, Gadi, and David Stern. Integrated Studies of Chloroplast Ribonucleases. United States Department of Agriculture, September 2011. http://dx.doi.org/10.32747/2011.7697125.bard.
Full textOhad, Itzhak, and Himadri Pakrasi. Role of Cytochrome B559 in Photoinhibition. United States Department of Agriculture, December 1995. http://dx.doi.org/10.32747/1995.7613031.bard.
Full textGenetic factors influence the relationship between the home environment and onset of depressive symptom. ACAMH, August 2018. http://dx.doi.org/10.13056/acamh.10571.
Full textAfrican Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.
Full text