Results 11 to 20 of about 38,729 (264)

Capacities of Quantum Erasure Channels [PDF]

open access: yesPhysical Review Letters, 1997
4 pages, RevTeX, epsf macros to include 2 eps figures. See also http://vesta.physics.ucla.edu/~smolin/ Version 2, submitted to Phys. Rev.
Bennett, Charles H.   +2 more
openaire   +3 more sources

New Two-Stage Automorphism Group Decoders for Cyclic Codes

open access: yesIEEE Access, 2020
Recently, error correcting codes in the erasure channel have drawn great attention for various applications such as distributed storage systems and wireless sensor networks, but many of their decoding algorithms are not practical because they have higher
Chanki Kim, Jong-Seon No
doaj   +1 more source

Optimal Age Over Erasure Channels [PDF]

open access: yesIEEE Transactions on Information Theory, 2019
Previous works on age of information and erasure channels have dealt with specific models and computed the average age or average peak age for certain settings. In this paper, given a source that produces a letter every $T_s$ seconds and an erasure channel that can be used every $T_c$ seconds, we ask what is the coding strategy that minimizes the time ...
Elie Najm, Emre Telatar, Rajai Nasser
openaire   +2 more sources

A generalized erasure channel in the sense of polarization for binary erasure channels [PDF]

open access: yes2016 IEEE Information Theory Workshop (ITW), 2016
A short version has been submitted to IEEE ...
Sakai, Yuta, Iwata, Ken-ichi
openaire   +2 more sources

Person Re-identification Model Combining Attention and Batch Feature Erasure [PDF]

open access: yesJisuanji gongcheng, 2022
Aiming to make more comprehensive use of pedestrian features, this study proposes a person re-identification model combining Attention and Batch Feature Erasure Network(ABFE-Net) to solve the problem of reduced recognition accuracy caused by the partial ...
HAO Axiang, JIA Guojun
doaj   +1 more source

Joint cache-channel coding over erasure broadcast channels [PDF]

open access: yes2015 International Symposium on Wireless Communication Systems (ISWCS), 2015
submitted as an invited paper to ISWCS ...
Timo, Roy, Wigger, Michele
openaire   +2 more sources

An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors

open access: yesEntropy, 2022
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević   +2 more
doaj   +1 more source

Perfect and Quasi-Perfect Codes for the Bosonic Classical-Quantum Channel

open access: yesIEEE Transactions on Quantum Engineering, 2023
In this article, we explore perfect and quasi-perfect codes for the Bosonic channel, where information is generated by a laser and conveyed in the form of coherent states.
Andreu Blasco Coll, Javier R. Fonollosa
doaj   +1 more source

Codes for the quantum erasure channel [PDF]

open access: yesPhysical Review A, 1997
6 pages, RevTeX, no figures, submitted to Physical Review A, code extended to encode 2 qubits, references ...
Grassl, Markus   +2 more
openaire   +2 more sources

Strong secrecy for erasure wiretap channels [PDF]

open access: yes2010 IEEE Information Theory Workshop, 2010
Submitted to the Information Theory Workship (ITW) 2010 ...
Suresh, Ananda T.   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy