We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 658 results
  1. Obtaining new classes of optimal linear codes by puncturing and shortening optimal cyclic codes

    In this paper we use the puncturing and shortening techniques on two already-known classes of optimal cyclic codes in order to obtain three new...

    Article Open access 06 April 2024
  2. Construction of binary self-orthogonal codes

    In this paper, we first give two new methods for constructing self-orthogonal codes from known self-orthogonal codes. On the basis of this, we...

    **aoshan Kai, Jiayuan Zhang, ... Shixin Zhu in Cryptography and Communications
    Article 10 October 2023
  3. Training 1-Bit Networks on a Sphere: A Geometric Approach

    Weight binarization offers a promising alternative towards building highly efficient Deep Neural Networks (DNNs) that can be deployed in low-power,...
    Luis Guerra, Ajanthan Thalaiyasingam, ... Tom Drummond in Artificial Neural Networks and Machine Learning – ICANN 2022
    Conference paper 2022
  4. Minimizing Query Frequency to Bound Congestion Potential for Moving Entities at a Fixed Target Time

    Consider a collection of entities moving continuously with bounded speed, but otherwise unpredictably, in some low-dimensional space. Two such...
    William Evans, David Kirkpatrick in Fundamentals of Computation Theory
    Conference paper 2023
  5. Further projective binary linear codes derived from two-to-one functions and their duals

    Binary linear codes with few weights have wide applications in communication, secret sharing schemes, authentication codes, association schemes,...

    Sihem Mesnager, Liqin Qian, **wang Cao in Designs, Codes and Cryptography
    Article 10 October 2022
  6. Coding and bounds for partially defective memory cells

    This paper considers coding for so-called partially stuck (defect) memory cells. Such memory cells can only store partial information as some of...

    Haider Al Kim, Sven Puchinger, ... Antonia Wachter-Zeh in Designs, Codes and Cryptography
    Article Open access 24 August 2023
  7. On the Subfield Codes of a Subclass of Optimal Cyclic Codes and Their Covering Structures

    A class of optimal three-weight \([q^k-1,k+1,q^{k-1}(q-1)-1]\)...
    Félix Hernández, Gerardo Vega in LATIN 2022: Theoretical Informatics
    Conference paper 2022
  8. Additive Manufacturing

    This chapter considers solving a problem in combinatorial search: the automated arrangement of irregularshaped objects for industrial 3D printing....
    Stefan Edelkamp in Algorithmic Intelligence
    Chapter 2023
  9. A class of subfield codes of linear codes and their duals

    Recently, subfield codes of some optimal linear codes have been studied. In this paper, we further investigate a class of subfield codes and...

    **aoqiang Wang, Dabin Zheng, Yan Zhang in Cryptography and Communications
    Article 18 October 2020
  10. Two families of subfield codes with a few weights

    Subfield codes of linear codes over finite fields have recently received a lot of attention, as some of these codes are optimal and have applications...

    Can **ang, Wenjuan Yin in Cryptography and Communications
    Article 06 October 2020
  11. Binary linear codes with few weights from Boolean functions

    Boolean functions have very nice applications in coding theory and cryptography. In coding theory, Boolean functions have been used to construct...

    **aoqiang Wang, Dabin Zheng, Yan Zhang in Designs, Codes and Cryptography
    Article 07 June 2021
  12. A class of binary cyclic codes with optimal parameters

    Kaiqiang Liu, Qi Wang, Haode Yan in Cryptography and Communications
    Article 12 November 2021
  13. Improved bounds for codes correcting insertions and deletions

    This paper studies the cardinality of codes correcting insertions and deletions. We give improved upper and lower bounds on code size. Our upper...

    Article Open access 07 January 2024
  14. Performance Analysis of Maximum-Likelihood Decoding of Polar Codes

    In space communication, effective channel coding schemes and decoding algorithms are essential for reliable communication. As the standard coding...
    ** Zheng, **nyuanmeng Yao, **ao Ma in Space Information Networks
    Conference paper 2024
  15. Identification and analysis of 3D pores in packed particulate materials

    We took the classic ‘guess the number of beans in a jar game’ and amplified the research question. Rather than estimate the quantity of particles in...

    Lindsay Riley, Peter Cheng, Tatiana Segura in Nature Computational Science
    Article 21 November 2023
  16. Geometric Restrictions to the Agglomeration of Spherical Particles

    Within the scope of the European Horizon 2020 project ACDC – Artificial Cells with Distributed Cores to Decipher Protein Function, we aim at the...
    Johannes Josef Schneider, David Anthony Barrow, ... Rudolf Marcel Füchslin in Artificial Life and Evolutionary Computation
    Conference paper Open access 2022
  17. Projective binary linear codes from special Boolean functions

    Linear codes with a few weights have nice applications in communication, secret sharing schemes, authentication codes, association schemes, block...

    Ziling Heng, Weiqiong Wang, Yan Wang in Applicable Algebra in Engineering, Communication and Computing
    Article 02 January 2020
Did you find what you were looking for? Share feedback.