Zobrazeno 1 - 10
of 187
pro vyhledávání: '"Short Code"'
Publikováno v:
The Computer Journal. 64:1600-1616
Thanks to excellent reliability, availability, flexibility and scalability, redundant arrays of independent (or inexpensive) disks (RAID) are widely deployed in large-scale data centers. RAID scaling effectively relieves the storage pressure of the d
Autor:
Vladimir Stankovic, Yong Fang
Publikováno v:
IEEE Transactions on Information Theory. 66:6580-6596
It was demonstrated that, as a nonlinear implementation of Slepian-Wolf Coding, Distributed Arithmetic Coding (DAC) outperforms traditional Low-Density Parity-Check (LPDC) codes for short code length and biased sources. This fact triggers research ef
Publikováno v:
IEICE Transactions on Communications. :979-988
Autor:
Sergey Markov, Valeriy V. Savchenko, I. E. Bronshtein, Georgiy A. Pankratenko, A. V. Spiridonov, Konstantin S. Sorokin, V. V. Kachanov, I. V. Aleksandrov, Mikhail K. Ermakov, Alexander S. Volkov
Publikováno v:
Programming and Computer Software. 46:362-372
Refactoring is an integral part of the modern software development process. Often, the refactoring must be performed at the global level with modifications in a large number of files. Making these modifications is a long and painstaking work. However
Publikováno v:
IET Communications. 14:2360-2368
Direct sequence spread spectrum (DSSS) signals are widely used in various military and civilian communication systems owing to its useful properties, such as lower working signal-to-noise ratio, strong anti-jamming capability, and robustness to multi
Publikováno v:
Xibei Gongye Daxue Xuebao, Vol 38, Iss 3, Pp 627-633 (2020)
LT code, as a channel coding scheme with good adaptability to the channel, has a stable performance in data transmission of underwater acoustic communication. In the case of large decoding overhead, the LT code can reach the ideal bit error rate(BER)
Publikováno v:
ISTC
The recursive projection-aggregation (RPA) decoder is a recently proposed near maximum likelihood (ML) decoder for Reed-Muller (RM) codes with low rates and short code lengths. However, the high computational complexity of RPA decoding is a major bot
Publikováno v:
ACM Transactions on Embedded Computing Systems. 19:1-22
Code-reuse attack is a concrete threat to computing systems because it can evade conventional security defenses. Control flow integrity (CFI) is proposed to repel this threat. However, former implementations of CFI suffer from two major drawbacks: co
Publikováno v:
IEEE Access, Vol 8, Pp 27851-27860 (2020)
IEEE Access
IEEE Access
Polar codes can provably achieve channel capacity and have been used in standards of the 5th generation wireless communication. As the first decoding algorithm of polar codes, successive cancellation (SC) suffers a significant error-correction perfor
Publikováno v:
IEEE Access, Vol 8, Pp 142459-142467 (2020)
A quasi-cyclic (QC) low-density parity-check (LDPC) code is called type-II, if the maximum weight over all circulants appearing in the parity-check matrix has the value of two. On the basis of multiplicative subgroup analysis for the prime field, a n