On the VLSI Design of a Pipeline Reed-Solomon Decoder Using Systolic Arrays
IEEE Transactions on Computers
Group Theoretic Signature Analysis
IEEE Transactions on Computers
Reliable broadband communication using a burst erasure correcting code
SIGCOMM '90 Proceedings of the ACM symposium on Communications architectures & protocols
Four State Asynchronous Architectures
IEEE Transactions on Computers
A VLSI decomposition of the deBruijn graph
Journal of the ACM (JACM)
Necessary and Sufficient Conditions on Block Codes Correcting/Detecting Errors of Various Types
IEEE Transactions on Computers
Learning and robust learning of product distributions
COLT '93 Proceedings of the sixth annual conference on Computational learning theory
Selective Broadcast Data Distribution Systems
IEEE Transactions on Computers
Low-Energy Digit-Serial/Parallel Finite Field Multipliers
Journal of VLSI Signal Processing Systems - Special issue on application specific systems, architectures and processors
ACM Transactions on Mathematical Software (TOMS)
On sharing secrets and Reed-Solomon codes
Communications of the ACM
A Rigorous Proof of the Waterloo Algorithm for the Discrete Logarithm Problem
Designs, Codes and Cryptography
The Science of Making ERORS: What Error Tolerance Implies for Capacity in Neural Networks
IEEE Transactions on Knowledge and Data Engineering
A Package for the Implementation of Block Codes as Finite Automata
CIAA '00 Revised Papers from the 5th International Conference on Implementation and Application of Automata
An Entropy Approach to the Hard-Core Model on Bipartite Graphs
Combinatorics, Probability and Computing
Extracting nested collocations
COLING '96 Proceedings of the 16th conference on Computational linguistics - Volume 1
Encyclopedia of Computer Science
Error correcting and detecting code
Encyclopedia of Computer Science
Encyclopedia of Computer Science
On the Number of Hamiltonian Cycles in a Tournament
Combinatorics, Probability and Computing
Analog Integrated Circuits and Signal Processing
Theoretic analysis and enhanced X-tolerance of test response compact based on convolutional code
Proceedings of the 2005 Asia and South Pacific Design Automation Conference
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Intelligent Data Analysis
Rapidly Selecting Good Compiler Optimizations using Performance Counters
Proceedings of the International Symposium on Code Generation and Optimization
A simulation-based proof technique for dynamic information flow
Proceedings of the 2007 workshop on Programming languages and analysis for security
Trees with exponentially growing costs
Information and Computation
Random Structures & Algorithms
Semantic security for the McEliece cryptosystem without random oracles
Designs, Codes and Cryptography
Fault tolerant nano-memory with fault secure encoder and decoder
Proceedings of the 2nd international conference on Nano-Networks
Discrete Applied Mathematics
Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation
Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation
CRT-based high-speed parallel architecture for long BCH encoding
IEEE Transactions on Circuits and Systems II: Express Briefs
IEEE Transactions on Communications
Distributed detection with censoring sensors under physical layer secrecy
IEEE Transactions on Signal Processing
Performance of unequally punctured convolutional codes
IEEE Transactions on Wireless Communications
Using the Bhattacharyya parameter for design and analysis of cooperative wireless systems
IEEE Transactions on Wireless Communications
IBM Journal of Research and Development
DNA error correcting codes: no crossover
CIBCB'09 Proceedings of the 6th Annual IEEE conference on Computational Intelligence in Bioinformatics and Computational Biology
On the discontinuity of the Shannon information measures
IEEE Transactions on Information Theory
Software defined radio for broadband OFDM protocols
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Energy optimal transmission scheduling in wireless sensor networks
IEEE Transactions on Wireless Communications
Scale-recursive lattice-based multiple-access symbol constellations
IEEE Transactions on Information Theory
Reliable and Robust Transmission and Storage Techniques for Medical Images with Patient Information
Journal of Medical Systems
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Fault secure encoder and decoder for nanomemory applications
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
List decoding of generalized reed-solomon codes by using a modified extended key equation algorithm
EURASIP Journal on Wireless Communications and Networking
Development of a neural net-based, personalized secure communication link
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part I
Upper and lower bounds on black-box steganography
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
A formal derivation of composite trust
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Dualities and identities for entanglement-assisted quantum codes
Quantum Information Processing
Hi-index | 0.16 |