A unified framework to obtain all known lower bounds (random coding, typical random coding and expurgated bound) on the reliability function of a point-to-point discrete memoryles...
Ali Nazari, Achilleas Anastasopoulos, S. Sandeep P...
In order to customize their behavior at runtime, a wide sort of modern frameworks do use code annotations at the applications classes as metadata configuration. However, despite i...
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
A new variable-rate coding technique is presented for two-dimensional constraints. For certain constraints, such as the (0, 2)-RLL, (2, )-RLL, and the "no isolated bits" ...
Optimal (v, 4, 2, 1) optical orthogonal codes (OOC) with v <= 75 and v = 71 are classified up to equivalence. One (v, 4, 2, 1) OOC is presented for all v 181, for which an opt...