A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings
スポンサーリンク
概要
- 論文の詳細を見る
- 2012-04-01
著者
-
Fujiwara Toru
Graduate School Of Information Science And Technology Osaka University
-
Fujiwara Toru
Graduate School Of Agricultural And Life Sciences The University Of Tokyo
-
Kusaka Takuya
Graduate School Of Natural Science And Technology Okayama University
-
YOKOYAMA Ryuhei
Graduate School of Natural Science and Technology, Okayama University
-
Yokoyama Ryuhei
Graduate School Of Natural Science And Technology Okayama University
関連論文
- The Vector Decomposition Problem
- Flexible Timed-Release Encryption
- Sufficient Conditions for Ruling-Out Useless Iterative Steps in a Class of Iterative Decoding Algorithms (Special Section on Information Theory and Its Applications)
- Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code(Coding Theory)
- Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code(HISC2006)
- Performance Analysis for Binary Image of Linear Block Codes over an Extended Field of GF(2)
- Adaptive Recursive Maximum Likelihood Decoding Based on the Coarsest Parallel Concatenation Decomposition : Evaluation of the Decoding Complexity by Simulation
- Selecting the Search Centers of h-Chase Decoding Algorithms by Simulation
- Verification of the Security against Inference Attacks on XML Databases
- Performance Analysis of Ordered Statistics Decoding for Error Correction in Digital Watermarking(HISC2006)
- The Local Weight Distributions of Transitive Invariant Codes and Their Punctured Codes
- Correctable Errors of Weight Half the Minimum Distance for the First-Order Reed-Muller Codes
- Relations among the Local Weight Distributions of a Linear Block Code, Its Extended Code and Its Even Weight Subcode
- Toward Digital Watermarking for Cryptographic Data
- Sufficient Conditions for Update Operations on Object-Oriented Database to Preserve the Security against Inference Attacks(Databases)
- Security against Inference Attacks on Negative Information in Object-Oriented Databases(Database)
- 10-19 Isolation and characterization of Arabidopsis thaliana mutants that require high boron supply for root elongation
- A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings
- P10-7 Identification and expression analysis of BOR1-like boron transporters in wheat