„Network Coding“
Suchergebnisse
3.793 Treffer
-
Correction to: Cyclic codes over $$M_{4} (\mathbb {F}_{2}+u\mathbb {F}_{2})$$ M 4 ( F 2 + u F 2 )
-
Correction to: Histogram and entropy oriented image coding for clustered wireless multimedia sensor networks (WMSNS)
-
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage
-
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage
-
Correction to: New constructions of entanglement-assisted quantum codes
-
Correction to: Editorial
-
Correction to: H.264 Video Coding‑Based Motion Estimation Architecture for Video Broadcasting from a Studio
-
Correction to: A Method of Motion‑Estimation‑Based H.264 Video Coding Using Optimal Search‑Range
-
Correction to: Role of non-coding RNA networks in leukemia progression, metastasis and drug resistance
-
Correction to: Self-dual codes over F 2 × ( F 2 + v F 2 ) $$ {\mathbbm{F}}_2\times \left({\mathbbm{F}}_2+v{\mathbbm{F}}_2\right) $$
-
Correction to: A low delay rate control method for screen content coding
-
Correction to: Integer codes correcting burst asymmetric errors within a byte and double asymmetric errors
-
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
-
Optimizing MC-CDMA System Performance via UTTCM Channel Coding Techniques
-
New ICD-11 features for coding late sequelae and chronic post-procedural conditions
-
Correction to: Good integers and some applications in coding theory
-
Secure image transmission in wireless sensor networks using DNA coding and memcapacitor-based hyperchaotic system for encryption and decryption
-
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps
-
Formal security analysis and improvement based on the ZLL touchlink commissioning protocol
-
Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies