Results 31 to 40 of about 523,662 (284)

Methods of analysis of linear integer decoding pseudo-random codes

open access: yesНаука. Инновации. Технологии, 2022
Scientific and technical and social and economic progress changed life of millions of people, it has given boundless opportunities for receiving and information exchange. However, in this regard the number of technical means of processing and information
Tamila Valerievna Lavrovska   +2 more
doaj  

A Complete Characterization of Irreducible Cyclic Orbit Codes and their Pl\"ucker Embedding [PDF]

open access: yes, 2012
Constant dimension codes are subsets of the finite Grassmann variety. The study of these codes is a central topic in random linear network coding theory. Orbit codes represent a subclass of constant dimension codes.
Anna-Lena Trautmann   +7 more
core   +1 more source

Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems [PDF]

open access: yes, 2019
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-
Günlü, Onur   +3 more
core   +2 more sources

Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]

open access: yesQuantum
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are $good$ in that they exhibit constant rate and average distance scaling $\Delta \propto \sqrt{
Jonathan Conrad   +2 more
doaj   +1 more source

Random Linear Network Coding: A free cipher? [PDF]

open access: yes2007 IEEE International Symposium on Information Theory, 2007
5 pages, 2 figures, Accepted for the IEEE International Symposium on Information Theory, Nice, France, June ...
Lima, Lu��sa   +2 more
openaire   +3 more sources

Linear codes on solid bursts and random errors [PDF]

open access: yesTransactions on Combinatorics, 2015
The paper presents lower and upper bounds on the number of parity check digits required for a linear code that detects solid bursts of length $b$ or less and simultaneously any $e$ or less random errors.
Pankaj Kumar Das
doaj  

Caching at the Edge with Fountain Codes [PDF]

open access: yes, 2018
We address the use of linear randon fountain codes caching schemes in a heterogeneous satellite network. We consider a system composed of multiple hubs and a geostationary Earth orbit satellite.
Liva, Gianluigi   +2 more
core   +3 more sources

Erasure List-Decodable Codes from Random and Algebraic Geometry Codes

open access: yes, 2014
Erasure list decoding was introduced to correct a larger number of erasures with output of a list of possible candidates. In the present paper, we consider both random linear codes and algebraic geometry codes for list decoding erasure errors.
Ding, Yang, Jin, Lingfei, Xing, Chaoping
core   +1 more source

Sparse Regression Codes for Multi-terminal Source and Channel Coding [PDF]

open access: yes, 2012
We study a new class of codes for Gaussian multi-terminal source and channel coding. These codes are designed using the statistical framework of high-dimensional linear regression and are called Sparse Superposition or Sparse Regression codes.
Tatikonda, Sekhar, Venkataramanan, Ramji
core   +1 more source

Application Layer Systematic Network Coding for Sliced H.264/AVC Video Streaming

open access: yesAdvances in Multimedia, 2012
Application Layer Forward Error Correction (AL-FEC) with rateless codes can be applied to protect the video data over lossy channels. Expanding Window Random Linear Codes (EW RLCs) are a flexible unequal error protection fountain coding scheme which can ...
Sajid Nazir   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy