CONSTRUCTION OF NUMERICAL CODES.

被引:0
|
作者
Shiozaki, Akira
Nishida, Fujio
Tanaka, Hatsukazu
机构
来源
| 1600年 / 56期
关键词
723 Computer Software; Data Handling and Applications;
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
相关论文
共 50 条
  • [31] Hospital emergency codes. An appraisal
    Al-Aboud, Daifullah M.
    Al-Aboud, Khalid M.
    SAUDI MEDICAL JOURNAL, 2010, 31 (12) : 1377 - 1377
  • [32] Ring Encoders for Position Codes.
    Chesnokov, Yu.N.
    Sharin, Yu.S.
    Izvestia vyssih ucebnyh zavedenij. Priborostroenie, 1979, 22 (11): : 53 - 58
  • [33] ON THREE-ELEMENT CODES.
    Karhumaeki, Juhani
    Theoretical Computer Science, 1984, 40 (01) : 3 - 11
  • [34] SERIAL PROCESSING OF INTERLEAVED CODES.
    Bossen, D.C.
    Hsiao, M.Y.
    IBM Technical Disclosure Bulletin, 1974, 17 (03): : 809 - 910
  • [35] SOFT DECISION DECODING OF BLOCK CODES.
    Baumert, L.D.
    McEliece, R.J.
    1600, Int Found for Telem, Woodland Hills, Calif (14):
  • [36] TWO-DIMENSIONAL CYCLIC CODES.
    Ikai, Takao
    Kosako, Hideo
    Kojima, Yosiaki
    1600, (57):
  • [37] FURTHER RESULTS ON THE COVERING RADIUS OF CODES.
    Cohen, Gerard D.
    Lobstein, Antoine C.
    Sloane, N.J.A.
    IEEE Transactions on Information Theory, 1986, IT-32 (06) : 680 - 694
  • [38] IDENTIFYING PCBs USING BAR CODES.
    Buckley, David
    EP Electronic Production (London), 1985, 14 (06): : 23 - 24
  • [39] Rf cavity computer design codes.
    McIntosh, PA
    PROCEEDINGS OF THE 1995 PARTICLE ACCELERATOR CONFERENCE, VOLS 1-5, 1996, : 2353 - 2355
  • [40] SOME CONSTRUCTIONS AND BOUNDS FOR AUTHENTICATION CODES.
    Stinson, D.R.
    Journal of Cryptology, 1988, 1 (01) : 37 - 51