Artículos de revistas sobre el tema "Code Construction Networks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Code Construction Networks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Skachek, Vitaly. "Recursive Code Construction for Random Networks". IEEE Transactions on Information Theory 56, n.º 3 (marzo de 2010): 1378–82. http://dx.doi.org/10.1109/tit.2009.2039163.
Texto completoSanna, Michele y Ebroul Izquierdo. "A Survey of Linear Network Coding and Network Error Correction Code Constructions and Algorithms". International Journal of Digital Multimedia Broadcasting 2011 (2011): 1–12. http://dx.doi.org/10.1155/2011/857847.
Texto completoZhao, Xubo. "An efficient basic convolutional network code construction algorithm on cyclic networks". AEU - International Journal of Electronics and Communications 67, n.º 12 (diciembre de 2013): 1072–78. http://dx.doi.org/10.1016/j.aeue.2013.06.010.
Texto completoAbbas, Huda Saleh, Mark A. Gregory y Michael W. Austin. "A New Prime Code for Synchronous Optical Code Division Multiple-Access Networks". Journal of Computer Networks and Communications 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3192520.
Texto completoShapoval, Nataliia y Denys Lobanov. "Detecting Handwritten Line for TikZ Code Generating". Electronics and Control Systems 2, n.º 76 (23 de junio de 2023): 56–60. http://dx.doi.org/10.18372/1990-5548.76.17671.
Texto completoDuo, Bin, Xiaoling Zhong y Yong Guo. "Practical polar code construction for degraded multiple-relay networks". China Communications 14, n.º 4 (abril de 2017): 127–39. http://dx.doi.org/10.1109/cc.2017.7927571.
Texto completoNlend, Samuel y Theo G. Swart. "Construction and Characterization of Optical Orthogonal Codes (n,w,1) for Fast Frequency Hopping-Optical Code Division Multiple Access". ECTI Transactions on Electrical Engineering, Electronics, and Communications 20, n.º 1 (18 de febrero de 2022): 62–73. http://dx.doi.org/10.37936/ecti-eec.2022201.246105.
Texto completoGRELCK, CLEMENS, SVEN-BODO SCHOLZ y ALEX SHAFARENKO. "A GENTLE INTRODUCTION TO S-NET: TYPED STREAM PROCESSING AND DECLARATIVE COORDINATION OF ASYNCHRONOUS COMPONENTS". Parallel Processing Letters 18, n.º 02 (junio de 2008): 221–37. http://dx.doi.org/10.1142/s0129626408003351.
Texto completoLi, Jian, Tongtong Li y Jian Ren. "Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks". IEEE Transactions on Information Theory 63, n.º 7 (julio de 2017): 4414–29. http://dx.doi.org/10.1109/tit.2017.2694441.
Texto completoLi, Xiyang y Kenneth W. Shum. "Mixed construction of OOC for optical code division multiple access networks". IET Communications 13, n.º 7 (23 de abril de 2019): 837–41. http://dx.doi.org/10.1049/iet-com.2018.5602.
Texto completoLi, Xiyang y Kenneth W. Shum. "A mixed construction of variable-weight optical orthogonal code for optical code division multiple access networks". Physical Communication 39 (abril de 2020): 101025. http://dx.doi.org/10.1016/j.phycom.2020.101025.
Texto completoChen, Jia, Quankai Qi, Yongjie Wang, Xuehu Yan y Longlong Li. "Data Hiding Based on Mini Program Code". Security and Communication Networks 2021 (24 de mayo de 2021): 1–12. http://dx.doi.org/10.1155/2021/5546344.
Texto completoПогасій, С. С., С. В. Мілевський, О. С. Жученко, Б. П. Томашевський, І. Р. Рагімова y С. В. Сергієв. "Development of Niederriter crypto-code design models on LDPC-codes". Системи обробки інформації, n.º 4(167) (26 de diciembre de 2021): 58–68. http://dx.doi.org/10.30748/soi.2021.167.05.
Texto completoAsif, Muhammad, Wuyang Zhou, Qingping Yu, Saifullah Adnan, Md Sadek Ali y Muhammad Shahid Iqbal. "Jointly designed quasi-cyclic LDPC-coded cooperation with diversity combining at receiver". International Journal of Distributed Sensor Networks 16, n.º 7 (julio de 2020): 155014772093897. http://dx.doi.org/10.1177/1550147720938974.
Texto completoMorsy, Morsy A. y Moustafa H. Aly. "A New Hybrid Prime Code for OCDMA Network Multimedia Applications". Electronics 10, n.º 21 (5 de noviembre de 2021): 2705. http://dx.doi.org/10.3390/electronics10212705.
Texto completoFadhil, Hilal A., Syed A. Aljunid, Hassan Y. Ahmed y Hamza M. R. AlKhafaji. "Variable cross-correlation code construction for spectral amplitude coding optical CDMA networks". Optik 123, n.º 11 (junio de 2012): 956–63. http://dx.doi.org/10.1016/j.ijleo.2011.07.011.
Texto completoZhao, Chunli, Fengfan Yang, Daniel Kariuki Waweru, Chen Chen, Hongjun Xu y Lin Luo. "Distributed Goppa-Coded Generalized Spatial Modulation: Optimized Design and Performance Study". Electronics 12, n.º 11 (25 de mayo de 2023): 2404. http://dx.doi.org/10.3390/electronics12112404.
Texto completoAnshu, Anurag y Nikolas P. Breuckmann. "A construction of combinatorial NLTS". Journal of Mathematical Physics 63, n.º 12 (1 de diciembre de 2022): 122201. http://dx.doi.org/10.1063/5.0113731.
Texto completoZeng, Yao, Yuxi Tang y Luping Xiang. "Physical Layer Security Design for Polar Code Construction". Cryptography 6, n.º 3 (4 de julio de 2022): 35. http://dx.doi.org/10.3390/cryptography6030035.
Texto completoRahmani, Mohamed, Abdelhamid Cherifi, Abdullah S. Karar, Ghoutia Naima Sabri y Boubakar S. Bouazza. "Contribution of New Three-Dimensional Code Based on the VWZCC Code Extension in Eliminating Multiple Access Interference in Optical CDMA Networks". Photonics 9, n.º 5 (3 de mayo de 2022): 310. http://dx.doi.org/10.3390/photonics9050310.
Texto completoKrylova, Victoria, Elena Tverytnykova, Oleg Vasylchenkov y Tatyana Kolisnyk. "PUNCTURED NCC CODES FOR INFORMATION PROTECTION IN INFORMATION AND MEASUREMENT SYSTEMS". Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, n.º 1(11) (18 de mayo de 2022): 38–43. http://dx.doi.org/10.20998/2413-4295.2022.01.06.
Texto completoZinoviev, V. A. y D. V. Zinoviev. "On the Generalized Concatenated Construction for the Nordstrom–Robinson Code and the Binary Golay Code". Problems of Information Transmission 57, n.º 4 (octubre de 2021): 331–40. http://dx.doi.org/10.1134/s0032946021040037.
Texto completoAbdulwahab, Walled K. y Abdulkareem A. Kadhim. "Internal pilot insertion for polar codes". Indonesian Journal of Electrical Engineering and Computer Science 22, n.º 3 (1 de junio de 2021): 1495. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1495-1504.
Texto completoLiu, Xiao, Mianxiong Dong, Yuxin Liu, Anfeng Liu y Neal N. Xiong. "Construction Low Complexity and Low Delay CDS for Big Data Code Dissemination". Complexity 2018 (20 de junio de 2018): 1–19. http://dx.doi.org/10.1155/2018/5429546.
Texto completoYang, Shuai. "Construction of Video Courses of Physical Education and Health Education in Colleges and Universities under the MOOC Platform". Mobile Information Systems 2021 (3 de junio de 2021): 1–8. http://dx.doi.org/10.1155/2021/9925838.
Texto completoDarginavičienė, I. y I. Ignotaitė. "Code-switching in the computer-mediated communication". RUDN Journal of Sociology 20, n.º 2 (15 de diciembre de 2020): 405–15. http://dx.doi.org/10.22363/2313-2272-2020-20-2-405-415.
Texto completoAddad, Mouad y Ali Djebbari. "A New Code Family for QS-CDMA Visible Light Communication Systems". Journal of Telecommunications and Information Technology 3 (28 de septiembre de 2018): 5–8. http://dx.doi.org/10.26636/jtit.2018.124318.
Texto completoPedrosa, Valéria G. y Max H. M. Costa. "Index Coding with Multiple Interpretations". Entropy 24, n.º 8 (18 de agosto de 2022): 1149. http://dx.doi.org/10.3390/e24081149.
Texto completoASAHINA, Hiromu, Kentaroh TOYODA, P. Takis MATHIOPOULOS, Iwao SASASE y Hisao YAMAMOTO. "RPL-Based Tree Construction Scheme for Target-Specific Code Dissemination in Wireless Sensors Networks". IEICE Transactions on Communications E103.B, n.º 3 (1 de marzo de 2020): 190–99. http://dx.doi.org/10.1587/transcom.2019ebp3066.
Texto completoZHANG, Chongfu, Kun QIU, Yu XIANG y Hua XIAO. "Construction of Frequency-Hopping/Time-Spreading Two-Dimensional Optical Codes Using Quadratic and Cubic Congruence Code". IEICE Transactions on Communications E94-B, n.º 7 (2011): 1883–91. http://dx.doi.org/10.1587/transcom.e94.b.1883.
Texto completoChen, Biao, Weiming Zhang, Kede Ma y Nenghai Yu. "Recursive code construction for reversible data hiding in DCT domain". Multimedia Tools and Applications 72, n.º 2 (17 de mayo de 2013): 1985–2009. http://dx.doi.org/10.1007/s11042-013-1493-x.
Texto completoHong, Xiaobin. "Based on the Software Complexity Measurement of Complex Networks under Big Data Technology". Journal of Physics: Conference Series 2066, n.º 1 (1 de noviembre de 2021): 012014. http://dx.doi.org/10.1088/1742-6596/2066/1/012014.
Texto completoBenedetto, Sergio, Guido Montorsi, Dariush Divsalar y Fabrizio Pollara. "Soft-input soft-output modules for the construction and distributed iterative decoding of code networks". European Transactions on Telecommunications 9, n.º 2 (marzo de 1998): 155–72. http://dx.doi.org/10.1002/ett.4460090206.
Texto completoBabich, Fulvio y Francesca Vatta. "Turbo Codes Construction for Robust Hybrid Multitransmission Schemes". Journal of Communications Software and Systems 7, n.º 4 (20 de diciembre de 2011): 128. http://dx.doi.org/10.24138/jcomss.v7i4.174.
Texto completoThiers, Johann-Philipp y Jürgen Freudenberger. "Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography". Cryptography 5, n.º 4 (29 de noviembre de 2021): 33. http://dx.doi.org/10.3390/cryptography5040033.
Texto completoLi, Wei y Xin Wang. "Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software". Mobile Information Systems 2021 (19 de octubre de 2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.
Texto completoSaniya, M., B. Amulya, A. Sahiti, A. Nagarani y Dr M. Shanker. "Construction Site Accident Avoidance". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junio de 2022): 1269–78. http://dx.doi.org/10.22214/ijraset.2022.44042.
Texto completoKotenko, Igor, Konstantin Izrailov, Mikhail Buinevich, Igor Saenko y Rajeev Shorey. "Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities". Energies 16, n.º 13 (2 de julio de 2023): 5111. http://dx.doi.org/10.3390/en16135111.
Texto completoMartin-Du Pan, Oliver, Paul Woods y Richard Hanson-Graville. "Optimising pipe sizing and operating temperatures for district heating networks to minimise operational energy consumption". Building Services Engineering Research and Technology 40, n.º 2 (27 de septiembre de 2018): 237–55. http://dx.doi.org/10.1177/0143624418802590.
Texto completoJi, Jianhua, Ming Xu y Shuwen Yang. "Construction and performance analysis of a 2D optical orthogonal code". Journal of Optical Networking 6, n.º 4 (2007): 375. http://dx.doi.org/10.1364/jon.6.000375.
Texto completoZhang, Fan, Jian Xu y Gangqiang Yang. "Design of Regenerating Code Based on Security Level in Cloud Storage System". Electronics 12, n.º 11 (26 de mayo de 2023): 2423. http://dx.doi.org/10.3390/electronics12112423.
Texto completoScherer, Paul, Maja Trębacz, Nikola Simidjievski, Ramon Viñas, Zohreh Shams, Helena Andres Terre, Mateja Jamnik y Pietro Liò. "Unsupervised construction of computational graphs for gene expression data with explicit structural inductive biases". Bioinformatics 38, n.º 5 (9 de diciembre de 2021): 1320–27. http://dx.doi.org/10.1093/bioinformatics/btab830.
Texto completoZhang, Wenyu, Yaqun Zhao y Sijie Fan. "Cryptosystem Identification Scheme Based on ASCII Code Statistics". Security and Communication Networks 2020 (15 de diciembre de 2020): 1–10. http://dx.doi.org/10.1155/2020/8875864.
Texto completoHu, Hao. "Construction of Automatic Acquisition System for Multichannel Electronic Communication Signals Based on Sorting Optimization Algorithm". Mobile Information Systems 2022 (16 de agosto de 2022): 1–9. http://dx.doi.org/10.1155/2022/2385191.
Texto completoZhao, Yiqiang, Boning Shi, Qizhi Zhang, Yidong Yuan y Jiaji He. "Research on Cache Coherence Protocol Verification Method Based on Model Checking". Electronics 12, n.º 16 (11 de agosto de 2023): 3420. http://dx.doi.org/10.3390/electronics12163420.
Texto completoBadri, Mourad, Aymen Kout y Linda Badri. "Investigating the Effect of Aspect-Oriented Refactoring on the Unit Testing Effort of Classes: An Empirical Evaluation". International Journal of Software Engineering and Knowledge Engineering 27, n.º 05 (junio de 2017): 749–89. http://dx.doi.org/10.1142/s0218194017500280.
Texto completoAlimov, Timur Mansurovich, Mokhamad Belal Alabdullakh, Akhmed Khusham khusam Alkhuzaii y Radzhikh Ziad Kattavi. "Dynamic arrays in C ++ and minimax search problem". Interactive science, n.º 7 (41) (25 de julio de 2019): 10–12. http://dx.doi.org/10.21661/r-497643.
Texto completoKuleshov, Sergey, Aleksandra Zaytseva y Iliya Shalnev. "Distributed system of virtual machines for self-organized networks". Information and Control Systems, n.º 5 (16 de octubre de 2019): 30–37. http://dx.doi.org/10.31799/1684-8853-2019-5-30-37.
Texto completoWang, Luping, Kai Zhang, Haifeng Qian y Jie Chen. "Group Signature with Verifier-Local Revocation Based on Coding Theory". Security and Communication Networks 2021 (20 de agosto de 2021): 1–12. http://dx.doi.org/10.1155/2021/3259767.
Texto completoCui, Shujie y Peng Qi. "The legal construction of personal information protection and privacy under the Chinese Civil Code". Computer Law & Security Review 41 (julio de 2021): 105560. http://dx.doi.org/10.1016/j.clsr.2021.105560.
Texto completo