|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3242181 |
003 |
MWH |
005 |
20191025172802.0 |
007 |
cr nn 008mamaa |
008 |
121227s1991 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540475460
|
024 |
7 |
|
|a 10.1007/3-540-54303-1
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-540-47546-0
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a UY
|2 thema
|
072 |
|
7 |
|a UYA
|2 thema
|
245 |
1 |
0 |
|a EUROCODE '90
|h [electronic resource] :
|b International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990. Proceedings /
|c edited by Gerard Cohen, Pascale Charpin.
|
250 |
|
|
|a 1st ed. 1991.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 1991.
|
300 |
|
|
|a XII, 396 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 514
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a Concatenated spherical codes codes sphériques concaténés -- A note on automorphism groups of codes and symbol error probability computation -- A direct proof for the automorphism group of reed solomon codes -- A family of binary codes with asymptotically good distance distribution -- A transformation on boolean functions, its consequences on some problems related to reed-muller codes -- Covering radius of RM(1,9) in RM(3,9) -- The weights of the duals of binary bch codes of designed distance ?=9 -- The minimum distance of some binary codes via the newton's identities -- Minimum-change binary block-codes which are well balanced -- Construction of unequal error protection codes -- Unidirectional error detecting codes -- Coherent partitions and codes -- $$ frac{1}{ lambda }$$ -regular and $$ frac{1}{ lambda }$$ -homogeneous tournaments -- Decoding of codes on hyperelliptic curves -- Decoding of codes on the klein quartic -- Asymptotically good families of geometric goppa codes and the gilbert-varshamov bound -- Multiplicative character sums and non linear geometric codes -- A survey of identification schemes -- A correlation cryptographic scheme -- Pseudorandom permutations based on the D.E.S. scheme -- Linear complexity of transformed sequences -- Some remarks on a LFSR “disturbed” by other sequences -- Parameters for complex FFTs in finite residue class rings -- A cryptographic tool for programs protection -- Decoding techniques for convolutional codes -- A weighted-output variant of the viterbi algorithm for concatenated schemes using a convolutional inner code / Une Variante À Sortie Pondérée De L'Algorithme De Viterbi Pour Des Schémas Concaténés À Code Intérieur Convolutif -- Coded modulation with convolutional codes over rings -- A shannon-theoretic coding theorem in authentication theory -- Joint fractional entropy -- On the adaptive source coding / Sur Le Codage De Source Adaptatif -- Minimum codeword length and redundancy of Huffman codes -- Binary covering codes and high speed data transmission -- Coding and modulation for the gaussian channel, in the absence or in the presence of fluctuations / Codage Et Modulation Pour Le Canal Gaussien, Sans Ou Avec Fluctuations -- Comparison of two modulation-coding schemes for low-rate digital land mobile radiocommunication -- Chernoff bound of trellis coded modulation over correlated rayleigh channel -- A hybrid FEC-ARQ communication system using sequential decoding -- A 30 Mbits/s (255,223) reed-solomon decoder.
|
520 |
|
|
|a This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives the state of the art on coding in Europe and ranges from theoretical top- ics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and VLSI implementation. The book is divided into eight sections: - Algebraic codes - Combinatorial codes - Geometric codes - Protection of information - Convolutional codes - Information theory - Modulation - Applications of coding. Five of the sections are introduced by an invited contribution.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Cohen, Gerard.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Charpin, Pascale.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 514
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/3-540-54303-1
|3 Click to view e-book
|t 0
|
907 |
|
|
|a .b32421813
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21553464
|z 02-26-20
|
999 |
f |
f |
|i 0f0bd0ca-2aab-56e9-b9e9-98d9b241b4e6
|s 7cf0c22c-e52c-5407-8f4d-ded1bc560120
|t 0
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|t 0
|e E-Book
|h Library of Congress classification
|i Elec File
|