Results 1 to 10 of about 3,822,513 (334)

Use of Set Shaping Theory in the Development of Locally Testable Codes [PDF]

open access: greenSSRN Electronic Journal, 2022
Abstract: in developing locally testable codes, information is added to the coded message by creating redundancy in the codewords. In this article, we propose an alternative method in which redundancy is introduced on the message that must be transmitted before its encoding and not in the codewords.
Solomon Kozlov
  +8 more sources

Practical applications of Set Shaping Theory in Huffman coding [PDF]

open access: greenSSRN Electronic Journal, 2022
One of the biggest criticisms of the Set Shaping Theory is the lack of a practical application. This is due to the difficulty of its application. In fact, to apply this technique from an experimental point of view we must use a table that defines the correspondences between two sets.
Schmidt, Christian   +2 more
  +7 more sources

Toward a Source Coding Theory for Sets [PDF]

open access: greenData Compression Conference (DCC'06), 2006
The problem of communicating (unordered) sets, rather than (ordered) sequences is formulated. Elementary results in all major branches of source coding theory, including lossless coding, high-rate and low-rate quantization, and rate distortion theory are presented. In certain scenarios, rate savings of log n!
Vivek K Goyal, Lav R. Varshney
openaire   +3 more sources

Noncommutative coding theory and algebraic sets for skew PBW extensions

open access: green, 2023
arXiv admin note: text overlap with arXiv:2106 ...
Lezama, Oswaldo, Gallego, Claudia
openaire   +4 more sources

Radar Sensor Network Using a Set of New Ternary Codes: Theory and Application [PDF]

open access: greenIEEE Sensors Journal, 2011
In the radar sensor network (RSN), the interferences among different radar sensors can be effectively reduced when waveforms are properly designed. In this paper, we perform some theoretical studies on coexistence of phase coded waveforms in the RSN. We propose a new ternary codes-optimized punctured zero correlation zone sequence-pair set (ZCZPS)-and ...
Liang, Qilian, Xu, Lei
openaire   +3 more sources

A complementary set theory for quaternary code designs

open access: hybridThe Annals of Statistics, 2013
Quaternary code (QC) designs form an attractive class of nonregular factorial fractions. We develop a complementary set theory for characterizing optimal QC designs that are highly fractionated in the sense of accommodating a large number of factors. This is in contrast to existing theoretical results which work only for a relatively small number of ...
Mukerjee, Rahul, Tang, Boxin
openaire   +5 more sources

Court’s modification of category of gravity of the committed offence and implementation of compulsory measures set by the Article 92 of the Criminal Code of the Russian Federation: problems of theory, legislative regulation, and law enforcement

open access: goldЮридические исследования, 2021
Leaning on the analysis of the provisions of current legislation, clarification of the supreme judicial authority, scientific doctrine, case law materials and statistics, this article explores the implementation of compulsory measures set by the Article 92 of the Criminal Code of the Russian Federation, after court’s modification of the ...
Kirill Igorevich Nagornov
openaire   +3 more sources

Combining Grounded Theory Coding and Fuzzy-Set Qualitative Comparative Analysis to Understand Decision-Making Complexity

open access: green, 2023
This case study is based on a research project that analyzed how expert evaluators combine different modes of thinking when screening ideas for innovation. The findings of this research project are detailed in the journal article, “How experts screen ideas: the complex interplay of intuition, analysis and sensemaking” by Sukhov et al.
Alexandre Sukhov, Antti Sihvonen
  +6 more sources

A new class of codes for Boolean masking of cryptographic computations [PDF]

open access: yes, 2011
We introduce a new class of rate one-half binary codes: {\bf complementary information set codes.} A binary linear code of length $2n$ and dimension $n$ is called a complementary information set code (CIS code for short) if it has two disjoint information sets. This class of codes contains self-dual codes as a subclass.
Carlet, Claude   +3 more
arxiv   +5 more sources

Ethics Understanding of Software Professional In Risk Reducing Reusability Coding Using Inclusion Set Theory

open access: green, 2009
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
Singaravel, G.   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy