skip to main content
Skip header Section
Error Control Coding, Second EditionApril 2004
Publisher:
  • Prentice-Hall, Inc.
  • Division of Simon and Schuster One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-042672-7
Published:01 April 2004
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Blass E and Noubir G (2023). Forward Security with Crash Recovery for Secure Logs, ACM Transactions on Privacy and Security, 27:1, (1-28), Online publication date: 29-Feb-2024.
  2. Grujić M and Verbauwhede I (2024). Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique, IEEE Transactions on Information Forensics and Security, 19, (586-600), Online publication date: 1-Jan-2024.
  3. Maity R, Samanta J and Bhaumik J (2023). Single and double-adjacent error correcting code (SDECC) with lower design overheads and mis-correction rate for SRAMs, Microsystem Technologies, 29:6, (823-834), Online publication date: 1-Jun-2023.
  4. Savalam C and Alapati V (2023). Digital twin based FPGA implementation of FIR filter for multi-bit soft computing error detection and correction for industrial applications, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 27:7, (4289-4306), Online publication date: 1-Apr-2023.
  5. Zhu M, Jiang M and Zhao C Ternary Message Passing Decoding of RS-SPC Product Codes 2022 IEEE International Symposium on Information Theory (ISIT), (2916-2921)
  6. Nassar M and Yaakobi E (2022). Array Codes for Functional PIR and Batch Codes, IEEE Transactions on Information Theory, 68:2, (839-862), Online publication date: 1-Feb-2022.
  7. Yildiz H, Hatami H, Saber H, Cheng Y and Bae J Interleaver Design and Pairwise Codeword Distance Distribution Enhancement for Turbo Autoencoder 2021 IEEE Global Communications Conference (GLOBECOM), (01-06)
  8. ACM
    Wedemire B and Petersen B Fractional-Bits per Symbol Using Non-Powers-of-2-Point Constellations 10th International Conference on Telecommunications and Remote Sensing, (26-30)
  9. Nadkarni P and Garani S (2021). Non-binary entanglement-assisted stabilizer codes, Quantum Information Processing, 20:8, Online publication date: 1-Aug-2021.
  10. Li H, Bai B, Xu H and Chen C Construction of Algebraic-Based Variable-Rate QC-LDPC Codes 2021 IEEE International Symposium on Information Theory (ISIT), (374-379)
  11. Das A, Ramamoorthy A and Vaswani N Efficient and Robust Distributed Matrix Computations via Convolutional Coding 2021 IEEE International Symposium on Information Theory (ISIT), (1724-1729)
  12. Dai J, Niu K and Piao J Fast Construction of Bit-Interleaved Polar-Coded Modulation 2021 IEEE International Symposium on Information Theory (ISIT), (2566-2571)
  13. Kamenev M Sequential Decoding of High-Rate Reed-Muller Codes 2021 IEEE International Symposium on Information Theory (ISIT), (1076-1081)
  14. Shi C and Shen C An Attackability Perspective on No-Sensing Adversarial Multi-player Multi-armed Bandits 2021 IEEE International Symposium on Information Theory (ISIT), (533-538)
  15. Çiçek M and Akçam N (2021). A New Approach of Overlay Method for Cognitive SW HARQ System, Wireless Personal Communications: An International Journal, 118:2, (1075-1086), Online publication date: 1-May-2021.
  16. Xu J, Dai J, Zhang D and Niu K Asynchronous Polar-Coded MIMO 2021 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  17. Kurz S and Yaakobi E (2021). PIR Codes with Short Block Length, Designs, Codes and Cryptography, 89:3, (559-587), Online publication date: 1-Mar-2021.
  18. Watanabe K, Kaguchi R and Shinoda T (2021). Shortened LDPC codes accelerate OSD decoding performance, EURASIP Journal on Wireless Communications and Networking, 2021:1, Online publication date: 5-Feb-2021.
  19. Kim S and Liu X (2021). Crypto-Aided MAP Test for Low-Latency Detection of False Data in Short Packets, IEEE Transactions on Information Forensics and Security, 16, (4939-4949), Online publication date: 1-Jan-2021.
  20. Haddadi S, Farhang M and Derakhtian M (2020). Low-complexity decoding of LDPC codes using reduced-set WBF-based algorithms, EURASIP Journal on Wireless Communications and Networking, 2020:1, Online publication date: 21-Sep-2020.
  21. Taik Kim K, Joe-Wong C and Chiang M Coded Edge Computing IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (237-246)
  22. Nassar M and Yaakobi E Array Codes for Functional PIR and Batch Codes 2020 IEEE International Symposium on Information Theory (ISIT), (1024-1029)
  23. Subramaniam A, Heidarzadeh A, Pradhan A and Narayanan K Product Lagrange Coded Computing 2020 IEEE International Symposium on Information Theory (ISIT), (197-202)
  24. Dai J, Niu K and Si Z Asynchronous Polar-Coded Modulation 2020 IEEE International Symposium on Information Theory (ISIT), (419-424)
  25. Fritzmann T, Sigl G and Sepúlveda J Extending the RISC-V instruction set for hardware acceleration of the post-quantum scheme LAC Proceedings of the 23rd Conference on Design, Automation and Test in Europe, (1420-1425)
  26. ACM
    Rottenstreich O, Reviriego P, Porat E and Muthukrishnan S Constructions and Applications for Accurate Counting of the Bloom Filter False Positive Free Zone Proceedings of the Symposium on SDN Research, (135-145)
  27. Yu M, Sahraei S, Li S, Avestimehr S, Kannan S and Viswanath P Coded Merkle Tree: Solving Data Availability Attacks in Blockchains Financial Cryptography and Data Security, (114-134)
  28. Yardi A and Vijayakumaran S (2019). Properties of syndrome distribution for blind reconstruction of cyclic codes, Applicable Algebra in Engineering, Communication and Computing, 31:1, (23-41), Online publication date: 1-Jan-2020.
  29. Qin X, Peng S, Yang X and Yao Y Deep Learning based Channel Code Recognition using TextCNN 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), (1-5)
  30. ACM
    Liu X, Roberts D, Ausavarungnirun R, Mutlu O and Zhao J Binary Star Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, (807-820)
  31. Jain N and Banerjee A On Performance Analysis and Code Design for Visible Light Communication 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (536-543)
  32. Che H Faster-than-Nyquist Signaling based on Filter Bank Multicarrier Modulation 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (1-6)
  33. Zhang X and Lao Y (2019). On the Construction of Composite Finite Fields for Hardware Obfuscation, IEEE Transactions on Computers, 68:9, (1353-1364), Online publication date: 1-Sep-2019.
  34. Zewail A and Yener A Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity 2019 IEEE Information Theory Workshop (ITW), (1-5)
  35. ACM
    Li Y, Chen X, Zheng N, Hao J and Zhang T (2019). An Exploratory Study on Software-Defined Data Center Hard Disk Drives, ACM Transactions on Storage, 15:3, (1-22), Online publication date: 20-Aug-2019.
  36. Li J, Liu K, Lin S and Abdel-Ghaffar K Construction of Partial Geometries and LDPC codes based on Reed-Solomon Codes 2019 IEEE International Symposium on Information Theory (ISIT), (61-65)
  37. Yue C, Shirvanimoghaddam M, Li Y and Vucetic B Hamming Distance Distribution of the 0-reprocessing Estimate of the Ordered Statistic Decoder 2019 IEEE International Symposium on Information Theory (ISIT), (1337-1341)
  38. Huang Q, Zheng S, Ni Y, Wang Z and Wang S Querying Policies Based on Sparse Matrices for Noisy 20 Questions 2019 IEEE International Symposium on Information Theory (ISIT), (2409-2413)
  39. ACM
    Wang K, Louri A, Karanth A and Bunescu R IntelliNoC Proceedings of the 46th International Symposium on Computer Architecture, (589-600)
  40. Cayci S and Eryilmaz A (2019). Optimal Learning for Dynamic Coding in Deadline-Constrained Multi-Channel Networks, IEEE/ACM Transactions on Networking, 27:3, (1043-1054), Online publication date: 1-Jun-2019.
  41. Chang L, Chen P, Tan V, Wang C and Han Y (2019). On the Maximum Size of Block Codes Subject to a Distance Criterion, IEEE Transactions on Information Theory, 65:6, (3751-3757), Online publication date: 1-Jun-2019.
  42. Lee C (2019). Radical-Locator Polynomials and Row-Echelon Partial Syndrome Matrices With Applications to Decoding Cyclic Codes, IEEE Transactions on Information Theory, 65:6, (3713-3723), Online publication date: 1-Jun-2019.
  43. El-Bendary M and Abou El-Azm A (2019). Complexity considerations, Multimedia Tools and Applications, 78:12, (16633-16664), Online publication date: 1-Jun-2019.
  44. Kim B, Choi J and Min S Design tradeoffs for SSD reliability Proceedings of the 17th USENIX Conference on File and Storage Technologies, (281-294)
  45. ACM
    Kang I, Qiao F, Park D, Kane D, Young E, Cheng C and Graham R (2018). Three-dimensional Floorplan Representations by Using Corner Links and Partial Order, ACM Transactions on Design Automation of Electronic Systems, 24:1, (1-33), Online publication date: 31-Jan-2019.
  46. ACM
    Balasubramanian K, Yamuna B, P S, Lingasubramanian K and Mishra D Effect of sign-bit-flipping trojan on turbo coded communication systems Proceedings of the 20th International Conference on Distributed Computing and Networking, (502-505)
  47. (2019). A low-complexity DWT module and CRS minimal instruction set computer architecture for wireless visual sensor networks, International Journal of Ad Hoc and Ubiquitous Computing, 30:2, (73-90), Online publication date: 1-Jan-2019.
  48. ACM
    Wei W and Kim J Modeling and Analysis of the Anti-Jamming (AJ) Spread Spectrum System Using Quantized Chaotic Sequence with LDPC for Reliable Data Link Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (171-176)
  49. Konstantinidis K and Ramamoorthy A Leveraging Coding Techniques for Speeding up Distributed Computing 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  50. Evron I, Moroshko E and Crammer K Efficient loss-based decoding on graphs for extreme classification Proceedings of the 32nd International Conference on Neural Information Processing Systems, (7233-7244)
  51. Yasakethu S and Hewage C (2018). Efficient decoding algorithm for 3D video over wireless channels, Multimedia Tools and Applications, 77:23, (30683-30701), Online publication date: 1-Dec-2018.
  52. Wang X and Mow W Joint Channel-Network Decoding for Asynchronous Physical-Layer Network Coding 2018 IEEE Information Theory Workshop (ITW), (1-5)
  53. Liu B, Xie Y, Yang L and Yuan J An Iterative Soft-Decision Decoding Algorithm with Dynamic Saturation for Short Reed-Solomon Codes 2018 IEEE Information Theory Workshop (ITW), (1-5)
  54. Cai X, Zhou M, Xia T, Fong W, Lee W and Huang X (2018). Low-Power SDR Design on an FPGA for Intersatellite Communications, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 26:11, (2419-2430), Online publication date: 1-Nov-2018.
  55. Cideciyan R, Furrer S and Lantz M Shortened Cyclic Codes for Correcting and Detecting Burst Errors 2018 International Symposium on Information Theory and Its Applications (ISITA), (693-697)
  56. Zhou F and Kurkoski B Shaping Gain of Lattices Based on Convolutional Codes and Construction A 2018 International Symposium on Information Theory and Its Applications (ISITA), (183-187)
  57. Yardi A Blind Reconstruction of Binary Cyclic Codes over Binary Erasure Channel 2018 International Symposium on Information Theory and Its Applications (ISITA), (301-305)
  58. Isaka M Expected Error Rate of Probabilistic Network Codes over Gaussian Relay Network 2018 International Symposium on Information Theory and Its Applications (ISITA), (90-94)
  59. Zhang D, Sridharan V and Jian X Exploring and optimizing chipkill-correct for persistent memory based on high-density NVRAMs Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, (710-723)
  60. Lu S, Zhong S and Hashizume M (2018). Fault Leveling Techniques for Yield and Reliability Enhancement of NAND Flash Memories, Journal of Electronic Testing: Theory and Applications, 34:5, (559-570), Online publication date: 1-Oct-2018.
  61. Fritzmann T, Pöppelmann T and Sepulveda J Analysis of Error-Correcting Codes for Lattice-Based Key Exchange Selected Areas in Cryptography – SAC 2018, (369-390)
  62. ACM
    Gómez-Torrecillas J, Lobillo F and Navaro G Computing Free Distances of Idempotent Convolutional Codes Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation, (175-182)
  63. Nguyen K, Lyu K, Meng X, Sridharan V and Jian X Nonblocking memory refresh Proceedings of the 45th Annual International Symposium on Computer Architecture, (588-599)
  64. Khan F, Rehman A, Usman M, Tan Z and Puthal D (2018). Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest, Mobile Networks and Applications, 23:3, (479-488), Online publication date: 1-Jun-2018.
  65. Gashnikov M (2018). Adaptive Autoregressive Interpolation of Multidimensional Signals under Compression Based on Hierarchical Grid Interpolation, Optical Memory and Neural Networks, 27:2, (132-138), Online publication date: 1-Apr-2018.
  66. Ben Abdallah F (2018). Design and Implementation of a Flexible Multi-Mode DVB-T/H Receiver and Extension to DVBT-2, Journal of Signal Processing Systems, 90:4, (493-504), Online publication date: 1-Apr-2018.
  67. Mondjar-Guerra V, Garrido-Jurado S, Muoz-Salinas R, Marn-Jimnez M and Medina-Carnicer R (2018). Robust identification of fiducial markers in challenging conditions, Expert Systems with Applications: An International Journal, 93:C, (336-345), Online publication date: 1-Mar-2018.
  68. ACM
    Li B, Ramamoorthy A and Srikant R (2018). Mean-Field Analysis of Coding Versus Replication in Large Data Storage Systems, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 3:1, (1-28), Online publication date: 24-Feb-2018.
  69. Lee C (2018). Algebraic Decoding of Cyclic Codes Using Partial Syndrome Matrices, IEEE Transactions on Information Theory, 64:2, (952-971), Online publication date: 1-Feb-2018.
  70. Huang P, Liu Y, Zhang X, Siegel P and Haratsch E Syndrome-coupled rate-compatible error-correcting codes 2017 IEEE Information Theory Workshop (ITW), (454-458)
  71. Chang L, Wang C, Chen P, Han Y and Tan V Distance spectrum formula for the largest minimum hamming distance of finite-length binary block codes 2017 IEEE Information Theory Workshop (ITW), (419-423)
  72. Xiao X, Nasseri M, Vasić B and Lin S Serial concatenation of reed muller and LDPC codes with low error floor 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (688-693)
  73. Cohen R, Cassuto Y, Cohen R and Cassuto Y (2017). Coding for Improved Throughput Performance in Network Switches, IEEE/ACM Transactions on Networking, 25:5, (2802-2814), Online publication date: 1-Oct-2017.
  74. Hsieh T, Chih T and Wu M (2017). Cost-Effective Enhancement on Both Yield and Reliability for Cache Designs Based on Performance Degradation Tolerance, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25:9, (2434-2448), Online publication date: 1-Sep-2017.
  75. Wang J, Jin A, Shi D, Wang L, Shen H, Wu D, Hu L, Gu L, Lu L, Chen Y, Wang J, Saito Y, Benjebbour A and Kishiyama Y (2017). Spectral Efficiency Improvement With 5G Technologies: Results From Field Tests, IEEE Journal on Selected Areas in Communications, 35:8, (1867-1875), Online publication date: 1-Aug-2017.
  76. ACM
    Block K, Narain S and Noubir G An autonomic and permissionless Android covert channel Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (184-194)
  77. Li J, Li T and Ren J (2017). Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks, IEEE Transactions on Information Theory, 63:7, (4414-4429), Online publication date: 1-Jul-2017.
  78. Kudekar S, Kumar S, Mondelli M, Pfister H, Şaşoǧlu E and Urbanke R (2017). Reed–Muller Codes Achieve Capacity on Erasure Channels, IEEE Transactions on Information Theory, 63:7, (4298-4316), Online publication date: 1-Jul-2017.
  79. Wei C, Chen P, Han Y and Varshney P (2017). Local Threshold Design for Target Localization Using Error Correcting Codes in Wireless Sensor Networks in the Presence of Byzantine Attacks, IEEE Transactions on Information Forensics and Security, 12:7, (1571-1584), Online publication date: 1-Jul-2017.
  80. Ordentlich O and Polyanskiy Y Low complexity schemes for the random access Gaussian channel 2017 IEEE International Symposium on Information Theory (ISIT), (2528-2532)
  81. Zewail A and Yener A Coded caching for combination networks with cache-aided relays 2017 IEEE International Symposium on Information Theory (ISIT), (2433-2437)
  82. Bose B, Elarief N and Tallini L On codes achieving zero error capacities in limited magnitude error channels 2017 IEEE International Symposium on Information Theory (ISIT), (1386-1390)
  83. Li J, Liu K, Lin S and Abdel-Ghaffar K Reed-solomon based nonbinary globally coupled LDPC codes: Correction of random errors and bursts of erasures 2017 IEEE International Symposium on Information Theory (ISIT), (381-385)
  84. Lin S, Abdel-Ghaffar K, Li J and Liu K Iterative soft-decision decoding of reed-solomon codes of prime lengths 2017 IEEE International Symposium on Information Theory (ISIT), (341-345)
  85. Krishnan M, Puranik B, Kumar P, Tamo I and Barg A A study on the impact of locality in the decoding of binary cyclic codes 2017 IEEE International Symposium on Information Theory (ISIT), (176-180)
  86. Asi H and Yaakobi E Nearly optimal constructions of PIR and batch codes 2017 IEEE International Symposium on Information Theory (ISIT), (151-155)
  87. Schlegel C and Burnashev M (2017). The Interplay Between Error Control Coding and Iterative Signal Cancelation, IEEE Transactions on Signal Processing, 65:11, (3020-3031), Online publication date: 1-Jun-2017.
  88. Baron B, Spathis P, Rivano H, de Amorim M, Viniotis Y and Ammar M (2017). Centrally Controlled Mass Data Offloading Using Vehicular Traffic, IEEE Transactions on Network and Service Management, 14:2, (401-415), Online publication date: 1-Jun-2017.
  89. Yang Y, Grover P and Kar S (2017). Computing Linear Transformations With Unreliable Components, IEEE Transactions on Information Theory, 63:6, (3729-3756), Online publication date: 1-Jun-2017.
  90. Li C, Feng D, Hua Y, Wang F, Jiang C and Zhou W A log-aware synergized scheme for page-level FTL design Proceedings of the Conference on Design, Automation & Test in Europe, (1080-1085)
  91. Jardel F and Boutros J (2017). Edge Coloring and Stopping Sets Analysis in Product Codes With MDS Components, IEEE Transactions on Information Theory, 63:3, (1439-1462), Online publication date: 1-Mar-2017.
  92. Munib S and Khan A (2017). Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding, Multimedia Tools and Applications, 76:6, (8695-8710), Online publication date: 1-Mar-2017.
  93. Li Y, Wang H, Zhang X, Zheng N, Dahandeh S and Zhang T Facilitating magnetic recording technology scaling for data center hard disk drives through filesystem-level transparent local erasure coding Proceedings of the 15th Usenix Conference on File and Storage Technologies, (135-148)
  94. Andrews J (2017). Overviewing the State of the Transactions, IEEE Transactions on Wireless Communications, 16:2, (675-679), Online publication date: 1-Feb-2017.
  95. Angelopoulos G, Medard M and Chandrakasan A (2017). Harnessing Partial Packets in Wireless Networks, IEEE Transactions on Wireless Communications, 16:2, (694-704), Online publication date: 1-Feb-2017.
  96. Okumu E and Dlodlo M (2017). Transmit antenna selection for multiple antenna systems with stall avoidance, Computers and Electrical Engineering, 58:C, (144-153), Online publication date: 1-Feb-2017.
  97. Jiron I, Soto I, Azurdia-Meza C, Valencia A and Carrasco R (2017). A new DNA cryptosystem based on AG codes evaluated in gaussian channels, Telecommunications Systems, 64:2, (279-291), Online publication date: 1-Feb-2017.
  98. Constantin J, Houlmann R, Preyss N, Walenta N, Zbinden H, Junod P and Burg A (2017). An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems, Journal of Signal Processing Systems, 86:1, (1-15), Online publication date: 1-Jan-2017.
  99. Hanca J, Braeckman G, Munteanu A and Philips W (2016). Lightweight real-time error-resilient encoding of visual sensor data, Journal of Real-Time Image Processing, 12:4, (775-789), Online publication date: 1-Dec-2016.
  100. Rashmi K, Chowdhury M, Kosaian J, Stoica I and Ramchandran K EC-cache Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (401-417)
  101. Yao Y, Zhang W and Yu N (2016). Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams, Signal Processing, 128:C, (531-545), Online publication date: 1-Nov-2016.
  102. Ates O, Keskin S and Kocak T (2016). High throughput graphics processing unit based Fano decoder, Journal of Network and Computer Applications, 75:C, (128-137), Online publication date: 1-Nov-2016.
  103. ACM
    Abeyratne N, Chen H, Oh B, Dreslinski R, Chakrabarti C and Mudge T Checkpointing Exascale Memory Systems with Existing Memory Technologies Proceedings of the Second International Symposium on Memory Systems, (18-29)
  104. ACM
    Wang H, Li Y, Zhang X, Zhao X, Sun H and Zhang T On the Use of DRAM with Unrepaired Weak Cells in Computing Systems Proceedings of the Second International Symposium on Memory Systems, (327-337)
  105. ACM
    Li Y, Wang H, Zhao X, Sun H and Zhang T Applying Software-based Memory Error Correction for In-Memory Key-Value Store Proceedings of the Second International Symposium on Memory Systems, (268-278)
  106. Darabkh K, Ibeid H, Jafar I and Al-Zubi R (2016). A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels, Telecommunications Systems, 63:2, (205-221), Online publication date: 1-Oct-2016.
  107. ACM
    Zainuddin M, Dedu E and Bourgeois J SBN Proceedings of the 3rd ACM International Conference on Nanoscale Computing and Communication, (1-7)
  108. ACM
    Chen H, Wu C, Mudge T and Chakrabarti C (2016). RATT-ECC, ACM Transactions on Architecture and Code Optimization, 13:3, (1-24), Online publication date: 17-Sep-2016.
  109. ACM
    Tan J, Song S, Yan K, Fu X, Marquez A and Kerbyson D Combating the Reliability Challenge of GPU Register File at Low Supply Voltage Proceedings of the 2016 International Conference on Parallel Architectures and Compilation, (3-15)
  110. Amato P, Bellini S, Ferrari M, Laurent C, Sforzin M and Tomasoni A (2016). Fast Decoding ECC for Future Memories, IEEE Journal on Selected Areas in Communications, 34:9, (2486-2497), Online publication date: 1-Sep-2016.
  111. Lu S, Tsai C and Hashizume M (2016). Enhanced Built-In Self-Repair Techniques for Improving Fabrication Yield and Reliability of Embedded Memories, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:8, (2726-2734), Online publication date: 1-Aug-2016.
  112. ACM
    Cadambe V, Wang Z and Lynch N Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (305-313)
  113. Kolokotronis N, Katsiotis A and Kalouptsidis N (2016). Secretly Pruned Convolutional Codes, IEEE Transactions on Information Forensics and Security, 11:7, (1500-1514), Online publication date: 1-Jul-2016.
  114. ACM
    Kudekar S, Kumar S, Mondelli M, Pfister H, Şaşoğlu E and Urbanke R Reed-Muller codes achieve capacity on erasure channels Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (658-669)
  115. Burihabwa D, Felber P, Mercier H and Schiavoni V A Performance Evaluation of Erasure Coding Libraries for Cloud-Based Data Stores Distributed Applications and Interoperable Systems, (160-173)
  116. Mahmood R, Badr A and Khisti A (2016). Convolutional Codes With Maximum Column Sum Rank for Network Streaming, IEEE Transactions on Information Theory, 62:6, (3039-3052), Online publication date: 1-Jun-2016.
  117. Akkari N, Jornet J, Wang P, Fadel E, Elrefaei L, Malik M, Almasri S and Akyildiz I (2016). Joint physical and link layer error control analysis for nanonetworks in the Terahertz band, Wireless Networks, 22:4, (1221-1233), Online publication date: 1-May-2016.
  118. Lu X, Li J and Liu Y (2016). New Soft-Encoding Relay (SoER) Mechanisms for Wireless Relay Systems: Convolutional and Turbo Constructions, IEEE Transactions on Wireless Communications, 15:4, (2443-2457), Online publication date: 1-Apr-2016.
  119. Reviriego P, Liu S, Xiao L and Maestro J (2016). An Efficient Single and Double-Adjacent Error Correcting Parallel Decoder for the (24,12) Extended Golay Code, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:4, (1603-1606), Online publication date: 1-Apr-2016.
  120. Elishco O, Meyerovitch T and Schwartz M (2016). Semiconstrained Systems, IEEE Transactions on Information Theory, 62:4, (1688-1702), Online publication date: 1-Apr-2016.
  121. Wu T, Ganesan K, Hu Y, Wong H, Wong S and Mitra S (2016). TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35:4, (521-534), Online publication date: 1-Apr-2016.
  122. Jin X and Kim H (2016). Switched-Power Two-Layer Superposition Coding in Cooperative Decode-Forward Relay Systems, IEEE Transactions on Wireless Communications, 15:3, (2193-2204), Online publication date: 1-Mar-2016.
  123. Dolecek L and Sala F (2016). Channel Coding Methods for Non-Volatile Memories, Foundations and Trends in Communications and Information Theory, 13:1, (1-128), Online publication date: 1-Feb-2016.
  124. Shen C, Yu C and Huang C (2016). Algorithm and Architecture of Configurable Joint Detection and Decoding for MIMO Wireless Communications With Convolutional Codes, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:2, (587-599), Online publication date: 1-Feb-2016.
  125. Ji M, Caire G and Molisch A (2016). Fundamental Limits of Caching in Wireless D2D Networks, IEEE Transactions on Information Theory, 62:2, (849-869), Online publication date: 1-Feb-2016.
  126. Ganesan K, Grover P, Rabaey J and Goldsmith A (2016). On the Total Power Capacity of Regular-LDPC Codes With Iterative Message-Passing Decoders, IEEE Journal on Selected Areas in Communications, 34:2, (375-396), Online publication date: 1-Feb-2016.
  127. ACM
    Nair P, Roberts D and Qureshi M (2016). Citadel, ACM Transactions on Architecture and Code Optimization, 12:4, (1-24), Online publication date: 7-Jan-2016.
  128. Purohit G, Raju K and Chaubey V (2016). XOR-FREE implementation of convolutional encoder for reconfigurable hardware, International Journal of Reconfigurable Computing, 2016, (1-1), Online publication date: 1-Jan-2016.
  129. Rosas F, Souza R, Pellenz M, Oberli C, Brante G, Verhelst M and Pollin S (2016). Optimizing the Code Rate of Energy-Constrained Wireless Communications With HARQ, IEEE Transactions on Wireless Communications, 15:1, (191-205), Online publication date: 1-Jan-2016.
  130. Lima J, Barone M and Campello de Souza R (2016). Cosine transforms over fields of characteristic 2, Finite Fields and Their Applications, 37:C, (265-284), Online publication date: 1-Jan-2016.
  131. Lee S, Ueng F, Wang H and Chang Y (2016). Iterative multiuser detection for LDPC MIMO SC-FDMA communication systems, Transactions on Emerging Telecommunications Technologies, 27:1, (6-16), Online publication date: 1-Jan-2016.
  132. Zhenzhi Wu and Dake Liu (2015). High-Throughput Trellis Processor for Multistandard FEC Decoding, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:12, (2757-2767), Online publication date: 1-Dec-2015.
  133. Tomasi B, Casari P, Badia L and Zorzi M (2015). Cross-layer analysis via Markov models of incremental redundancy hybrid ARQ over underwater acoustic channels, Ad Hoc Networks, 34:C, (62-74), Online publication date: 1-Nov-2015.
  134. Jun Chen and Pratt T Energy-efficient transmission for linearly precoded MIMO systems MILCOM 2015 - 2015 IEEE Military Communications Conference, (878-883)
  135. Saiz-Adalid L, Reviriego P, Gil P, Pontarelli S and Maestro J (2015). MCU Tolerance in SRAMs Through Low-Redundancy Triple Adjacent Error Correction, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:10, (2332-2336), Online publication date: 1-Oct-2015.
  136. Yi Fang , Guoan Bi , Yong Liang Guan and Lau F (2015). A Survey on Protograph LDPC Codes and Their Applications, IEEE Communications Surveys & Tutorials, 17:4, (1989-2016), Online publication date: 1-Oct-2015.
  137. ACM
    Erozan A and Çavuş E An EG-LDPC Based 2-Dimensional Error Correcting Code for Mitigating MBUs of SRAM Memories Proceedings of the 12th FPGAworld Conference 2015, (21-26)
  138. Mitchell D, Lentmaier M and Costello D (2015). Spatially Coupled LDPC Codes Constructed From Protographs, IEEE Transactions on Information Theory, 61:9, (4866-4889), Online publication date: 1-Sep-2015.
  139. Le Zhang , Xuanyao Fong , Chip-Hong Chang , Zhi Hui Kong and Roy K (2015). Highly Reliable Spin-Transfer Torque Magnetic RAM-Based Physical Unclonable Function With Multi-Response-Bits Per Cell, IEEE Transactions on Information Forensics and Security, 10:8, (1630-1642), Online publication date: 1-Aug-2015.
  140. Muneer P and Sameer S (2015). Joint ML Estimation of CFO and Channel, and a Low Complexity Turbo Equalization Technique for High Mobility OFDMA Uplinks, IEEE Transactions on Wireless Communications, 14:7, (3642-3654), Online publication date: 1-Jul-2015.
  141. Sarreshtedari S and Akhaee M (2015). A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery, IEEE Transactions on Image Processing, 24:7, (2266-2277), Online publication date: 1-Jul-2015.
  142. Le Zhang , Xuanyao Fong , Chip-Hong Chang , Zhi Hui Kong and Roy K (2015). Optimizating Emerging Nonvolatile Memories for Dual-Mode Applications: Data Storage and Key Generator, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:7, (1176-1187), Online publication date: 1-Jul-2015.
  143. Namba K and Lombardi F (2015). Non-Binary Orthogonal Latin Square Codes for a Multilevel Phase Charge Memory (PCM), IEEE Transactions on Computers, 64:7, (2092-2097), Online publication date: 1-Jul-2015.
  144. ACM
    Vo-Huu T and Noubir G Mitigating Rate Attacks through Crypto-Coded Modulation Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, (237-246)
  145. ACM
    Mavropoulos M, Keramidas G, Adamopoulos G and Nikolos D Reconfigurable Proceedings of the 25th edition on Great Lakes Symposium on VLSI, (161-166)
  146. Reviriego P, Pontarelli S, Evans A and Maestro J (2015). A Class of SEC-DED-DAEC Codes Derived From Orthogonal Latin Square Codes, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:5, (968-972), Online publication date: 1-May-2015.
  147. Dumitrescu S and Yinghan Wan (2015). Bit-Error Resilient Index Assignment for Multiple Description Scalar Quantizers, IEEE Transactions on Information Theory, 61:5, (2748-2763), Online publication date: 1-May-2015.
  148. ACM
    Rashmi K, Shah N, Gu D, Kuang H, Borthakur D and Ramchandran K (2014). A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers, ACM SIGCOMM Computer Communication Review, 44:4, (331-342), Online publication date: 25-Feb-2015.
  149. Zhen Gao , Reviriego P, Wen Pan , Zhan Xu , Ming Zhao , Jing Wang and Maestro J (2015). Fault Tolerant Parallel Filters Based on Error Correction Codes, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:2, (384-387), Online publication date: 1-Feb-2015.
  150. ACM
    Wang X, Yuan Q, Cai H and Fang J (2014). A New Approach to Image Sharing with High-Security Threshold Structure, Journal of the ACM, 61:6, (1-19), Online publication date: 17-Dec-2014.
  151. Capovilla C, Casella I, Sguarezi Filho A, Azcue-Puma J, Jacomini R and Ruppert E (2014). A wind energy generator for smart grid applications using wireless-coded neuro-fuzzy power control, Computers & Mathematics with Applications, 68:12, (2112-2123), Online publication date: 1-Dec-2014.
  152. ACM
    Ye X, Li J and Xu L (2014). Distributed Separate Coding for Continuous Data Collection in Wireless Sensor Networks, ACM Transactions on Sensor Networks, 11:1, (1-26), Online publication date: 7-Nov-2014.
  153. Angelopoulos G, Chandrakasan A and Médard M Energy savings via harnessing partial packets in body area networks Proceedings of the 9th International Conference on Body Area Networks, (320-325)
  154. ACM
    Rashmi K, Shah N, Gu D, Kuang H, Borthakur D and Ramchandran K A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers Proceedings of the 2014 ACM conference on SIGCOMM, (331-342)
  155. ACM
    Huang Q, Sun K, Li X and Wu D Just FUN Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (83-92)
  156. ACM
    Kolokotronis N, Katsiotis A and Kalouptsidis N Short paper Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, (177-182)
  157. ACM
    Chen D, Konrad C, Yi K, Yu W and Zhang Q Robust set reconciliation Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (135-146)
  158. ACM
    Dutt N, Gupta P, Nicolau A, BanaiyanMofrad A, Gottscho M and Shoushtari M Multi-Layer Memory Resiliency Proceedings of the 51st Annual Design Automation Conference, (1-6)
  159. Scholl S and Wehn N Hardware implementation of a reed-solomon soft decoder based on information set decoding Proceedings of the conference on Design, Automation & Test in Europe, (1-6)
  160. ACM
    Zulfiqar A, Koka P, Schwetman H, Lipasti M, Zheng X and Krishnamoorthy A Wavelength stealing Proceedings of the 46th Annual IEEE/ACM International Symposium on Microarchitecture, (222-233)
  161. Raychowdhury A Spin torque devices in embedded memory Proceedings of the International Conference on Computer-Aided Design, (572-575)
  162. Rashid F, Miri A and Woungang I Proof of retrieval and ownership protocols for enterprise-level data deduplication Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, (81-90)
  163. Raychowdhury A Beyond charge based computation Proceedings of the 2013 International Symposium on Low Power Electronics and Design, (135-138)
  164. ACM
    Naskar R and Chakraborty R (2013). A generalized tamper localization approach for reversible watermarking algorithms, ACM Transactions on Multimedia Computing, Communications, and Applications, 9:3, (1-22), Online publication date: 1-Jun-2013.
  165. Kim J, Raorane P, Nasseri M and Alam M Performance analysis of sampling-based turbo coded NCQFSK for image data transmission Proceedings of the 46th Annual Simulation Symposium, (1-5)
  166. Zhao K, Zhao W, Sun H, Zhang T, Zhang X and Zheng N LDPC-in-SSD Proceedings of the 11th USENIX conference on File and Storage Technologies, (243-256)
  167. Reviriego P, Maestro J and Flanagan M (2013). Error detection in majority logic decoding of euclidean geometry low density parity check (EG-LDPC) codes, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 21:1, (156-159), Online publication date: 1-Jan-2013.
  168. ACM
    Wang Z, Zhou S, Wang Z, Wang B and Willett P Dynamic block-cycling over a linear network in underwater acoustic channels Proceedings of the 7th International Conference on Underwater Networks & Systems, (1-5)
  169. Lee S and Vishwanath S (2012). Boolean functions over nano-fabrics, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20:11, (2054-2065), Online publication date: 1-Nov-2012.
  170. Armano G, Chira C and Hatami N Ensemble of binary learners for reliable text categorization with a reject option Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part I, (137-146)
  171. Ahmadi A, El Bouanani F, Ben-Azza H and Benghabrit Y (2012). Reduced complexity iterative decoding of 3D-product block codes based on genetic algorithms, Journal of Electrical and Computer Engineering, 2012, (20-20), Online publication date: 1-Jan-2012.
  172. Vasic B, Ravanmehr V and Krishnan A (2012). An Information Theoretic Approach to Constructing Robust Boolean Gene Regulatory Networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:1, (52-65), Online publication date: 1-Jan-2012.
  173. ACM
    Nitta C, Farrens M and Akella V Resilient microring resonator based photonic networks Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, (95-104)
  174. ACM
    Zivic N Trust in corrected messages protected by message authentication codes Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-4)
  175. Bajic D and Burr A (2011). Comments on "Integer SEC-DED codes for low power communications" [Inform. Process. Lett. 110 (2010) 518-520], Information Processing Letters, 111:9, (414-415), Online publication date: 1-Apr-2011.
  176. Xu Y and Wang W (2011). The limit of information propagation speed in large-scale multihop wireless networks, IEEE/ACM Transactions on Networking, 19:1, (209-222), Online publication date: 1-Feb-2011.
  177. Chang H, Jamin S and Wang W (2011). Live streaming with receiver-based peer-division multiplexing, IEEE/ACM Transactions on Networking, 19:1, (55-68), Online publication date: 1-Feb-2011.
  178. Hu T and Chang M (2011). List decoding of generalized reed-solomon codes by using a modified extended key equation algorithm, EURASIP Journal on Wireless Communications and Networking, 2011, (1-6), Online publication date: 1-Jan-2011.
  179. Xiao M and Skoglund M (2010). Multiple-user cooperative communications based on linear network coding, IEEE Transactions on Communications, 58:12, (3345-3351), Online publication date: 1-Dec-2010.
  180. Dong L (2010). Turbo Equalization with Prediction and Iterative Estimation of Time-Varying Frequency-Selective Channels, Wireless Personal Communications: An International Journal, 55:4, (631-644), Online publication date: 1-Dec-2010.
  181. Hu T and Chang M (2010). Decoding shortened Reed Solomon codes at bit level, WSEAS TRANSACTIONS on COMMUNICATIONS, 9:11, (695-707), Online publication date: 1-Nov-2010.
  182. ACM
    Chakraborty A, Homayoun H, Khajeh A, Dutt N, Eltawil A and Kurdahi F E < MC2 Proceedings of the 2010 international conference on Compilers, architectures and synthesis for embedded systems, (237-246)
  183. Xiang B, Shen R, Pan A, Bao D and Zeng X (2010). An area-efficient and low-power multirate decoder for quasi-cyclic low-density parity-check codes, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:10, (1447-1460), Online publication date: 1-Oct-2010.
  184. Li S and Zhang T (2010). Improving multi-level NAND flash memory storage reliability using concatenated BCH-TCM coding, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:10, (1412-1420), Online publication date: 1-Oct-2010.
  185. ACM
    Tomasi B, Casari P, Badia L and Zorzi M A study of incremental redundancy hybrid ARQ over Markov channel models derived from experimental data Proceedings of the 5th International Workshop on Underwater Networks, (1-8)
  186. ACM
    Chen B, Zhou Z, Zhao Y and Yu H Efficient error estimating coding Proceedings of the ACM SIGCOMM 2010 conference, (3-14)
  187. ACM
    Chen B, Zhou Z, Zhao Y and Yu H (2010). Efficient error estimating coding, ACM SIGCOMM Computer Communication Review, 40:4, (3-14), Online publication date: 16-Aug-2010.
  188. Wu Y and Chang S (2010). Coding schemes for noiseless and noisy asynchronous CDMA systems, IEEE Transactions on Information Theory, 56:8, (3786-3792), Online publication date: 1-Aug-2010.
  189. Bhat U, Fertonani D and Duman T (2010). Approximate performance analysis for linear codes in superposition schemes over Gaussian broadcast channels, IEEE Transactions on Communications, 58:8, (2177-2182), Online publication date: 1-Aug-2010.
  190. Bhaumik J and Chowdhury D (2010). New architectural design of CA-based codec, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:7, (1139-1144), Online publication date: 1-Jul-2010.
  191. Villalba L, Cortez J and Blaum M (2010). On the efficiency of shortened cyclic single-burst-correcting codes, IEEE Transactions on Information Theory, 56:7, (3290-3296), Online publication date: 1-Jul-2010.
  192. ACM
    Xu R, Kocak T, Woodward G and Morris K Throughput improvement on bidirectional Fano algorithm Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (276-280)
  193. ACM
    Wilkerson C, Alameldeen A, Chishti Z, Wu W, Somasekhar D and Lu S (2010). Reducing cache power with low-cost, multi-bit error-correcting codes, ACM SIGARCH Computer Architecture News, 38:3, (83-93), Online publication date: 19-Jun-2010.
  194. ACM
    Wilkerson C, Alameldeen A, Chishti Z, Wu W, Somasekhar D and Lu S Reducing cache power with low-cost, multi-bit error-correcting codes Proceedings of the 37th annual international symposium on Computer architecture, (83-93)
  195. Han Y, Harliman P, Kim S, Kim J and Kim C (2010). A novel architecture for block interleaving algorithm in MB-OFDM using mixed radix system, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:6, (1020-1024), Online publication date: 1-Jun-2010.
  196. Ait-Idir T, Chafnaji H and Saoudi S (2010). Turbo packet combining for broadband space-time BICM hybrid-ARQ systems with co-channel interference, IEEE Transactions on Wireless Communications, 9:5, (1686-1697), Online publication date: 1-May-2010.
  197. Choi H, Liu W and Sung W (2010). VLSI implementation of BCH error correction for multilevel cell NAND flash memory, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:5, (843-847), Online publication date: 1-May-2010.
  198. Mohsenin T, Truong D and Baas B (2010). A low-complexity message-passing algorithm for reduced routing congestion in LDPC decoders, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:5, (1048-1061), Online publication date: 1-May-2010.
  199. Al-Shaikhi A and Ilow J (2010). Design of packet-based block codes with shift operators, EURASIP Journal on Wireless Communications and Networking, 2010, (1-11), Online publication date: 1-Apr-2010.
  200. Yeo C and Ramchandran K (2010). Robust distributed multiview video compression for wireless camera networks, IEEE Transactions on Image Processing, 19:4, (995-1008), Online publication date: 1-Apr-2010.
  201. Pasca V, Anghel L, Rusu C, Locatelli R and Coppola M Error resilience of intra-die and inter-die communication with 3D Spidergon STNoC Proceedings of the Conference on Design, Automation and Test in Europe, (275-278)
  202. Luo Y, Vinck A and Chen Y (2010). On the optimum distance profiles about linear block codes, IEEE Transactions on Information Theory, 56:3, (1007-1014), Online publication date: 1-Mar-2010.
  203. Kim S (2010). Randomized parity forwarding in large-scale cooperative broadcast network, IEEE Transactions on Communications, 58:3, (860-868), Online publication date: 1-Mar-2010.
  204. ACM
    Kim S and Ro W FPGA implementation of highly parallelized decoder logic for network coding (abstract only) Proceedings of the 18th annual ACM/SIGDA international symposium on Field programmable gate arrays, (284-284)
  205. Kim E and Kim J Double binary turbo coded data transmission for STBC BPAM-DS UWB system Proceedings of the 12th international conference on Advanced communication technology, (14-18)
  206. Mansour M and Tewfik A (2010). Convolutional decoding in the presence of synchronization errors, IEEE Journal on Selected Areas in Communications, 28:2, (218-227), Online publication date: 1-Feb-2010.
  207. Wang Y and Chen J (2010). A baseband signal processing scheme for joint data frame synchronization and symbol decoding for RFID systems, EURASIP Journal on Advances in Signal Processing, 2010, (1-11), Online publication date: 1-Feb-2010.
  208. Escribano F, López L and Sanjuán M (2010). Improving the performance of chaos-based modulations via serial concatenation, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:2, (448-459), Online publication date: 1-Feb-2010.
  209. Tam W, Lau F and Tse C (2010). A class of QC-LDPC codes with low encoding complexity and good error performance, IEEE Communications Letters, 14:2, (169-171), Online publication date: 1-Feb-2010.
  210. Asghar R and Liu D (2010). Multimode flex-interleaver core for baseband processor platform, Journal of Computer Systems, Networks, and Communications, 2010:S1, (1-16), Online publication date: 1-Jan-2010.
  211. Lin R, Martin P and Taylor D (2010). Cooperative signaling with soft information combining, Journal of Electrical and Computer Engineering, 2010, (1-7), Online publication date: 1-Jan-2010.
  212. Avram I, Aerts N, Duyck D and Moeneclaey M (2010). A novel quantize-and-forward cooperative system, EURASIP Journal on Wireless Communications and Networking, 2010, (1-11), Online publication date: 1-Jan-2010.
  213. Tooher P and Soleymani M (2010). Analysis and code design of variable time-fraction collaborative communications, IEEE Transactions on Wireless Communications, 9:1, (208-217), Online publication date: 1-Jan-2010.
  214. Zhang W, Lentmaier M, Zigangirov K and Costello D (2010). Braided convolutional codes, IEEE Transactions on Information Theory, 56:1, (316-331), Online publication date: 1-Jan-2010.
  215. Chen S, Yeh C and Huang W Transmission Rate Enhancement for Scalable H.264/AVC Video over MIMO Wireless Systems Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing, (55-64)
  216. ACM
    Chishti Z, Alameldeen A, Wilkerson C, Wu W and Lu S Improving cache lifetime reliability at ultra-low voltages Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, (89-99)
  217. Li Y A low-cost 60 GHz OFDM modem Proceedings of the 7th international conference on Information, communications and signal processing, (275-279)
  218. Walsh J, Weber S and Maina C (2009). Optimal rate, IEEE Transactions on Information Theory, 55:12, (5491-5510), Online publication date: 1-Dec-2009.
  219. Jin M and Yoo C (2009). Quantum hashing for multimedia, IEEE Transactions on Information Forensics and Security, 4:4, (982-994), Online publication date: 1-Dec-2009.
  220. Lan T, Lee R and Chiang M Multi-path key establishment against REM attacks in wireless ad hoc networks Proceedings of the 28th IEEE conference on Global telecommunications, (6255-6262)
  221. Ait-Idir T, Chafnaji H and Saoudi S Frequency domain hybrid Proceedings of the 28th IEEE conference on Global telecommunications, (3739-3744)
  222. Gomaa A, Nafie M and Abdallah M Novel reliability-based hybrid ARQ technique Proceedings of the 28th IEEE conference on Global telecommunications, (2194-2199)
  223. Bhat U, Fertonani D and Duman T Performance bounds for linear codes in multi-rate superposition schemes Proceedings of the 28th IEEE conference on Global telecommunications, (1728-1732)
  224. Ibing A, Kühling D and Boche H On the relation of MIMO APP detection and SIMO maximum ratio combining Proceedings of the 28th IEEE conference on Global telecommunications, (1444-1449)
  225. Wang C, Lin S and Fossorier M On asymptotic ensemble weight enumerators of multi-edge type codes Proceedings of the 28th IEEE conference on Global telecommunications, (1289-1294)
  226. Hashimoto T, Wakiyama T, Ishibashi K and Wada T A proposal of new hybrid ARQ scheme suitable for multi-hop transmissions using LDPC codes Proceedings of the 28th IEEE conference on Global telecommunications, (814-819)
  227. ACM
    Chang H, Jamin S and Wang W Live streaming performance of the Zattoo network Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, (417-429)
  228. Ganguly A, Pande P and Belzer B (2009). Crosstalk-aware channel coding schemes for energy efficient and reliable NOC interconnects, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:11, (1626-1639), Online publication date: 1-Nov-2009.
  229. Wu J, Wang Z and Vojcic B (2009). Partial iterative decoding for binary turbo codes via cross-entropy based bit selection, IEEE Transactions on Communications, 57:11, (3298-3306), Online publication date: 1-Nov-2009.
  230. Cheng Z, Castura J and Mao Y (2009). On the design of raptor codes for binary-input Gaussian channels, IEEE Transactions on Communications, 57:11, (3269-3277), Online publication date: 1-Nov-2009.
  231. ACM
    Soude H, Agueh M and Mehat J Towards an optimal reed solomon codes selection for sensor networks Proceedings of the 6th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (165-166)
  232. Vaman D, Koay S, Annamalai A and Agarwal N A simple and least complex KV transform coding technique with low BER performance at low Eb/No for multi-tiered applications in power and bandwidth constrained MANET/sensor networks Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (329-336)
  233. Xiaotao D, Jun G and Gaoqi D Construction of QC LDPC codes based on cyclic subgroup over GF(q) Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (492-494)
  234. Hueske K and Götze J Ov-OFDM Proceedings of the 6th international conference on Symposium on Wireless Communication Systems, (206-210)
  235. El Héni N, Lagrange X and Maillé P Optimization of link adaptation and HARQ schemes for multicast in high speed cellular networks Proceedings of the 6th international conference on Symposium on Wireless Communication Systems, (131-135)
  236. Wu C, Chen P, Han Y and Kuo M (2009). Maximum-likelihood priority-first search decodable codes for combined channel estimation and error correction, IEEE Transactions on Information Theory, 55:9, (4191-4203), Online publication date: 1-Sep-2009.
  237. Roth R and Vontobel P (2009). List decoding of burst errors, IEEE Transactions on Information Theory, 55:9, (4179-4190), Online publication date: 1-Sep-2009.
  238. Cha B and Kuo C (2009). Robust MC-CDMA-based fingerprinting against time-varying collusion attacks, IEEE Transactions on Information Forensics and Security, 4:3, (302-317), Online publication date: 1-Sep-2009.
  239. Zhang J, Patil N and Mitra S (2009). Probabilistic analysis and design of metallic-carbon-nanotube-tolerant digital logic circuits, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28:9, (1307-1320), Online publication date: 1-Sep-2009.
  240. He Y, Haccoun D and Cardinal C (2009). Error performances of multi shift-register convolutional self-doubly-orthogonal codes, IEEE Communications Letters, 13:9, (685-687), Online publication date: 1-Sep-2009.
  241. ACM
    Wong S, Chen C and Wu Q Power-management-based Chien search for low power BCH decoder Proceedings of the 2009 ACM/IEEE international symposium on Low power electronics and design, (299-302)
  242. ACM
    Abouzeid F, Clerc S, Firmin F, Renaudin M and Sicard G A 45nm CMOS 0.35v-optimized standard cell library for ultra-low power applications Proceedings of the 2009 ACM/IEEE international symposium on Low power electronics and design, (225-230)
  243. Mansour M (2009). A parallel pruned bit-reversal interleaver, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:8, (1147-1151), Online publication date: 1-Aug-2009.
  244. Vuran M and Akyildiz I (2009). Error control in wireless sensor networks, IEEE/ACM Transactions on Networking, 17:4, (1186-1199), Online publication date: 1-Aug-2009.
  245. Ferreira H, Abdel-Ghaffar K, Cheng L, Swart T and Ouahada K (2009). Moment balancing templates, IEEE Transactions on Information Theory, 55:8, (3494-3500), Online publication date: 1-Aug-2009.
  246. Graef N, Hammerschmidt J and Sundberg C (2009). A low-complexity Max-Log-MAP detector, IEEE Transactions on Communications, 57:8, (2251-2254), Online publication date: 1-Aug-2009.
  247. Wang C and Fossorier M (2009). On asymptotic ensemble weight enumerators of LDPC-like codes, IEEE Journal on Selected Areas in Communications, 27:6, (899-907), Online publication date: 1-Aug-2009.
  248. Esmaeili M and Gholami M (2009). Geometrically-structured maximum-girth LDPC block and convolutional codes, IEEE Journal on Selected Areas in Communications, 27:6, (831-845), Online publication date: 1-Aug-2009.
  249. ACM
    Papirla V and Chakrabarti C Energy-aware error control coding for Flash memories Proceedings of the 46th Annual Design Automation Conference, (658-663)
  250. Živic N, Rehman O and Ruland C Analysis of serial and parallel soft input decryption schemes over a wireless channel Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems, (282-288)
  251. Kim E and Kim J Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments Proceedings of the International Conference on Computational Science and Its Applications: Part II, (212-225)
  252. Lu H, Martin K, Bui F, Plataniotis K and Hatzinakos D Face recognition with biometric encryption for privacy-enhancing self-exclusion Proceedings of the 16th international conference on Digital Signal Processing, (625-632)
  253. Stoufs M, Munteanu A, Barbarien J, Cornelis J and Schelkens P Error protection of scalable sources Proceedings of the 16th international conference on Digital Signal Processing, (567-572)
  254. Jeganathan J, Ghrayeb A, Szczecinski L and Ceron A (2009). Space shift keying modulation for MIMO channels, IEEE Transactions on Wireless Communications, 8:7, (3692-3703), Online publication date: 1-Jul-2009.
  255. Arikan E (2009). Channel polarization, IEEE Transactions on Information Theory, 55:7, (3051-3073), Online publication date: 1-Jul-2009.
  256. Gluesing-Luerssen H and Schneider G (2009). A MacWilliams identity for convolutional codes, IEEE Transactions on Information Theory, 55:7, (2920-2930), Online publication date: 1-Jul-2009.
  257. Lee S and Kim K (2009). Design of low-rate irregular LDPC codes using trellis search, IEEE Transactions on Communications, 57:7, (1994-2004), Online publication date: 1-Jul-2009.
  258. Kuo F, Tan K, Li X, Zhang J and Fu X XOR rescue Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (511-519)
  259. ACM
    Chang S, Wu H and Pang A Fundamental theories on new pattern exclusive coding Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (1449-1453)
  260. ACM
    Arabaci M, Djordjevic I, Saunders R and Marcoccia R Regular non-binary quasi-cyclic LDPC codes for high-rate applications Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (764-769)
  261. Lai H, Ma C and Lu E Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance, (563-569)
  262. Amiri S and Bajić I Subset selection in type-II hybrid ARQ/FEC for video multicast Proceedings of the 2009 IEEE international conference on Communications, (5452-5456)
  263. Cao L, Kam P and Tao M Impact of imperfect channel state information on ARQ schemes over rayleigh fading channels Proceedings of the 2009 IEEE international conference on Communications, (3647-3651)
  264. Van V, Matsui H and Mita S Low complexity encoder for generalized quasi-cyclic codes coming from finite geometries Proceedings of the 2009 IEEE international conference on Communications, (1955-1960)
  265. Chu J, Eckford A and Adve R Optimization for fractional cooperation in multiple-source multiple-relay systems Proceedings of the 2009 IEEE international conference on Communications, (1558-1562)
  266. ACM
    Falcão G, Silva V and Sousa L How GPUs can outperform ASICs for fast LDPC decoding Proceedings of the 23rd international conference on Supercomputing, (390-399)
  267. Smarandache R, Pusane A, Vontobel P and Costello D (2009). Pseudocodeword performance analysis for LDPC convolutional codes, IEEE Transactions on Information Theory, 55:6, (2577-2598), Online publication date: 1-Jun-2009.
  268. Metzner J (2009). Simplification of packet-symbol decoding with errors, deletions, misordering of packets, and no sequence numbers, IEEE Transactions on Information Theory, 55:6, (2626-2639), Online publication date: 1-Jun-2009.
  269. Khozeimeh F and Hranilovic S (2009). Dynamic spot diffusing configuration for indoor optical wireless access, IEEE Transactions on Communications, 57:6, (1765-1775), Online publication date: 1-Jun-2009.
  270. Zhou B, Kang J, Song S, Lin S, Abdel-Ghaffar K and Xu M (2009). Construction of non-binary quasi-cyclic LDPC codes by arrays and array dispersions, IEEE Transactions on Communications, 57:6, (1652-1662), Online publication date: 1-Jun-2009.
  271. Hormis R and Wang X (2009). Low-complexity coded-modulation for ISI-constrained channels, IEEE Transactions on Communications, 57:6, (1836-1846), Online publication date: 1-Jun-2009.
  272. Pan W and Ortega A (2009). Adaptive computation control of variable complexity Fano decoders, IEEE Transactions on Communications, 57:6, (1556-1559), Online publication date: 1-Jun-2009.
  273. ACM
    Guo Z, Huang J, Wang B, Cui J, Zhou S and Willett P A practical joint network-channel coding scheme for reliable communication in wireless networks Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (279-288)
  274. ACM
    Li S and Zhang T Improving multi-level NAND flash memory storage reliability using concatenated TCM-BCH coding Proceedings of the 19th ACM Great Lakes symposium on VLSI, (499-504)
  275. Zhou B, Kang J, Tai Y, Lin S and Ding Z (2009). High performance non-binary quasi-cyclic LDPC codes on euclidean geometries, IEEE Transactions on Communications, 57:5, (1298-1311), Online publication date: 1-May-2009.
  276. Xiao M and Aulin T (2009). Optimal decoding and performance analysis of a noisy channel network with network coding, IEEE Transactions on Communications, 57:5, (1402-1412), Online publication date: 1-May-2009.
  277. Dong L Turbo equalization with channel prediction and iterative channel estimation Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (553-558)
  278. Liang Y, Poor H and Shamai (Shitz) S (2009). Information Theoretic Security, Foundations and Trends in Communications and Information Theory, 5:4–5, (355-580), Online publication date: 1-Apr-2009.
  279. Naeimi H and DeHon A (2009). Fault secure encoder and decoder for nanomemory applications, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:4, (473-486), Online publication date: 1-Apr-2009.
  280. Fischer R and Siegl C (2009). Reed-Solomon and simplex codes for peak-to-average power ratio reduction in OFDM, IEEE Transactions on Information Theory, 55:4, (1519-1528), Online publication date: 1-Apr-2009.
  281. Chu J, Adve R and Eckford A (2009). Using the Bhattacharyya parameter for design and analysis of cooperative wireless systems, IEEE Transactions on Wireless Communications, 8:3, (1384-1395), Online publication date: 1-Mar-2009.
  282. Ma C, Lai H and Lu E An error control scheme of hybrid ARQ based on conception of plurality voting Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1, (19-21)
  283. Islam M and Kim J On the use of QC-LDPC code for data transfer using short and medium block length Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (1804-1809)
  284. ACM
    Kim K and Kim J Cyclic delay diversity for V-BLAST OFDM system Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (481-487)
  285. Toyserkani A, Rydström M, Ström E and Svensson A (2009). A scheduling algorithm for minimizing the packet error probability in clusterized TDMA networks, EURASIP Journal on Wireless Communications and Networking, 2009, (1-1), Online publication date: 1-Feb-2009.
  286. Zielinski K, Weitkemper P, Laur R and Kammeyer K (2009). Optimization of power allocation for interference cancellation with particle swarm optimization, IEEE Transactions on Evolutionary Computation, 13:1, (128-150), Online publication date: 1-Feb-2009.
  287. Gacanin H and Adachi F (2009). Throughput of type II HARQ-OFDM/TDM using MMSE-FDE in a multipath channel, Research Letters in Communications, 2009, (1-1), Online publication date: 1-Jan-2009.
  288. Laraway S and Farhang-Boroujeny B (2009). Implementation of a Markov chain Monte Carlo based multiuser/MIMO detector, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 56:1, (246-255), Online publication date: 1-Jan-2009.
  289. Song S, Zhou B, Lin S and Abdel-Ghaffar K (2009). A unified approach to the construction of binary and nonbinary quasi-cyclic LDPC codes based on finite fields, IEEE Transactions on Communications, 57:1, (84-93), Online publication date: 1-Jan-2009.
  290. Gyaourova A and Ross A A Novel Coding Scheme for Indexing Fingerprint Patterns Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, (755-764)
  291. Al-Suhail G (2008). An efficient error-robust wireless video transmission using link-layer FEC and low-delay ARQ schemes, Journal of Mobile Multimedia, 4:3, (275-292), Online publication date: 1-Oct-2008.
  292. ACM
    Katti S, Katabi D, Balakrishnan H and Medard M (2008). Symbol-level network coding for wireless mesh networks, ACM SIGCOMM Computer Communication Review, 38:4, (401-412), Online publication date: 1-Oct-2008.
  293. ACM
    Zhang W, Stojanovic M and Mitra U Analysis of a simple multihop underwater acoustic network Proceedings of the 3rd International Workshop on Underwater Networks, (3-10)
  294. ACM
    Katti S, Katabi D, Balakrishnan H and Medard M Symbol-level network coding for wireless mesh networks Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (401-412)
  295. Gössel M and Sogomonyan E (2008). A Non-linear Split Error Detection Code, Fundamenta Informaticae, 83:1-2, (109-115), Online publication date: 15-Aug-2008.
  296. Zivic N and Ruland C Method for improvement of soft input decryption performances Proceedings of the 12th WSEAS international conference on Computers, (633-636)
  297. Kgil T, Roberts D and Mudge T Improving NAND Flash Based Disk Caches Proceedings of the 35th Annual International Symposium on Computer Architecture, (327-338)
  298. ACM
    Kgil T, Roberts D and Mudge T (2008). Improving NAND Flash Based Disk Caches, ACM SIGARCH Computer Architecture News, 36:3, (327-338), Online publication date: 1-Jun-2008.
  299. Bender C, Sanda P, Kudva P, Mata R, Pokala V, Haraden R and Schallhorn M (2008). Soft-error resilience of the IBM POWER6 processor input/output subsystem, IBM Journal of Research and Development, 52:3, (285-292), Online publication date: 1-May-2008.
  300. Brandon T, Hang R, Block G, Gaudet V, Cockburn B, Howard S, Giasson C, Boyle K, Goud P, Zeinoddin S, Rapley A, Bates S, Elliott D and Schlegel C (2008). A scalable LDPC decoder ASIC architecture with bit-serial message exchange, Integration, the VLSI Journal, 41:3, (385-398), Online publication date: 1-May-2008.
  301. ACM
    Falcão G, Sousa L and Silva V Massive parallel LDPC decoding on GPU Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, (83-90)
  302. Gössel M and Sogomonyan E (2008). A Non-linear Split Error Detection Code, Fundamenta Informaticae, 83:1-2, (109-115), Online publication date: 1-Jan-2008.
  303. Poulliat C, Declercq D and Lestable T (2008). Efficient decoding of turbo codes with nonbinary belief propagation, EURASIP Journal on Wireless Communications and Networking, 2008, (1-10), Online publication date: 1-Jan-2008.
  304. Rauwerda G, Heysters P and Smit G (2008). Towards software defined radios using coarse-grained reconfigurable hardware, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:1, (3-13), Online publication date: 1-Jan-2008.
  305. Biswas S, Wang G, Metodi T, Kastner R and Chong F Combining static and dynamic defect-tolerance techniques for nanoscale memory systems Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (773-778)
  306. ACM
    Razavi R, Fleury M, Ghanbari M and Sadeghzadeh M Delay-aware interleaving and forward-error correction for video over wireless: Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling, (46-53)
  307. ACM
    Jamieson K and Balakrishnan H (2007). PPR, ACM SIGCOMM Computer Communication Review, 37:4, (409-420), Online publication date: 1-Oct-2007.
  308. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K (2007). Opportunistic Encryption, IEEE Transactions on Dependable and Secure Computing, 4:4, (313-324), Online publication date: 1-Oct-2007.
  309. Naeimi H and DeHon A Fault tolerant nano-memory with fault secure encoder and decoder Proceedings of the 2nd international conference on Nano-Networks, (1-7)
  310. Zhang Z and Li V (2007). Network-Supported Layered Multicast Transport Control for Streaming Media, IEEE Transactions on Parallel and Distributed Systems, 18:9, (1332-1344), Online publication date: 1-Sep-2007.
  311. Lee H, Kim D and Yoon H Performance of MCS selection for collaborative hybrid-ARQ protocol Proceedings of the 13th international Euro-Par conference on Parallel Processing, (941-949)
  312. Freire M, Fierrez J, Galbally J and Ortega-Garcia J Biometric hashing based on genetic selection and its application to on-line signatures Proceedings of the 2007 international conference on Advances in Biometrics, (1134-1143)
  313. ACM
    Jamieson K and Balakrishnan H PPR Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (409-420)
  314. Jabir A and Pradhan D (2007). A Graph-Based Unified Technique for Computing and Representing Coefficients over Finite Fields, IEEE Transactions on Computers, 56:8, (1119-1132), Online publication date: 1-Aug-2007.
  315. Seddiki A, Djebbari A, Rouvaen J and Taleb-Ahmed A Performance evaluation of BCH correcting codes on a fading channel using OFDM modulation Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (340-346)
  316. Darabkh K and Aygün R (2007). TCP traffic control evaluation and reduction over wireless networks using parallel sequential decoding mechanism, EURASIP Journal on Wireless Communications and Networking, 2007:3, (1-10), Online publication date: 1-Jul-2007.
  317. Xin Liu , Noubir G, Sundaram R and San Tan SPREAD Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2536-2540)
  318. Kozat U and Ramprashad S Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2316-2320)
  319. Sundararajan J, Medard M, MinJi Kim , Eryilmaz A, Shah D and Koetter R Network Coding in a Multicast Switch Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1145-1153)
  320. ACM
    Liu J, Liu Z, Towsley D and Xia C Maximizing the data utility of a data archiving & querying system through joint coding and scheduling Proceedings of the 6th international conference on Information processing in sensor networks, (244-253)
  321. Bayat-Sarmadi S and Hasan M (2007). On concurrent detection of errors in polynomial basis multiplication, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 15:4, (413-426), Online publication date: 1-Apr-2007.
  322. Anantha M, Bose B and Tallini L (2007). ARQ Protocols and Unidirectional Codes, IEEE Transactions on Computers, 56:4, (433-443), Online publication date: 1-Apr-2007.
  323. Zhiwei Lin , Xiaoming Peng , Khiam Boon Png and Chin F Kronecker Modelling for Correlated Shadowing in UWB MIMO Channels Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1583-1587)
  324. Jun Xu , Xuemin Shen , Mark J and Jun Cai Quasi-Optimal Real-time Video Transmission in OFDM Systems Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1496-1501)
  325. Masakawa T and Ochiai H Design of Reed-Solomon Codes for OFDM Systems with Clipping and Filtering Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1361-1366)
  326. Sang Wu Kim Concatenated Network Coding for Large-Scale Multi-Hop Wireless Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (985-989)
  327. ACM
    Jachimie N, Martinez-Vallin F and Saniie J CReconfigurable finite field instruction set architecture Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays, (216-220)
  328. Wang G, Futemma S and Itakura E (2007). Multiple-Description Coding for Overlay Network Streaming, IEEE MultiMedia, 14:1, (74-82), Online publication date: 1-Jan-2007.
  329. Liao C, Yeh J and Kao M A copy protection technique using multi-level error coding Proceedings of the 9th international conference on Information Security and Cryptology, (222-232)
  330. Zouros G and Robertson C Performance analysis of BPSK with errors and erasures decoding to mitigate the effects of pulse-noise interference Proceedings of the 2006 IEEE conference on Military communications, (697-702)
  331. Wu H and Abouzeid A (2006). Error resilient image transport in wireless sensor networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:15, (2873-2887), Online publication date: 18-Oct-2006.
  332. Munteanu A, Stoufs M, Cornelis J and Schelkens P Scalable and channel-adaptive unequal error protection of images with LDPC codes Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems, (722-733)
  333. Ozdag R and Beerel P (2006). An asynchronous low-power high-performance sequential decoder implemented with QDI templates, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14:9, (975-985), Online publication date: 1-Sep-2006.
  334. ACM
    Wu D and Ci S Cross-layer combination of hybrid ARQ and adaptive modulation and coding for QoS provisioning in wireless data networks Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks, (47-es)
  335. ACM
    Weingart T, Sicker D and Grunwald D Evaluation of cross-layer interactions for reconfigurable radio platforms Proceedings of the first international workshop on Technology and policy for accessing spectrum, (9-es)
  336. Mitrea M, Duţă S, Preda M and Prêteux F Data hiding techniques Proceedings of the 10th WSEAS international conference on Communications, (68-73)
  337. Morcos F, Chantem T, Little P, Gasiba T and Thain D iDIBS Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1, (58-67)
  338. ACM
    Wu D and Ci S Cross-layer design for combining adaptive modulation and coding with hybrid ARQ Proceedings of the 2006 international conference on Wireless communications and mobile computing, (147-152)
  339. ACM
    Ridoux J, Kassar M, Boc M, Fladenmuller A and Viniotis Y Performance of Taroko Proceedings of the 2006 international conference on Wireless communications and mobile computing, (109-114)
  340. ACM
    Koksal C, Jamieson K, Telatar E and Thiran P Impacts of channel variability on link-level throughput in wireless networks Proceedings of the joint international conference on Measurement and modeling of computer systems, (51-62)
  341. ACM
    Koksal C, Jamieson K, Telatar E and Thiran P (2006). Impacts of channel variability on link-level throughput in wireless networks, ACM SIGMETRICS Performance Evaluation Review, 34:1, (51-62), Online publication date: 26-Jun-2006.
  342. Du Q and Zhang X Cross-Layer Resource-Consumption Optimization for Mobile Multicast in Wireless Networks Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (368-376)
  343. Du Q and Zhang X Cross-Layer Resource-Consumption Optimization for Mobile Multicast in Wireless Networks Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (59-65)
  344. Lee H and Kim H A design of energy-efficient receivers for cluster-head nodes in wireless sensor networks Proceedings of the 6th international conference on Computational Science - Volume Part IV, (954-961)
  345. Hsu H, Yeo J and Wu A (2006). Multi-symbol-sliced dynamically reconfigurable reed-solomon decoder design based on unified finite-field processing element, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14:5, (489-500), Online publication date: 1-May-2006.
  346. Sun J, Zhao L and Anpalagan A (2006). Cross-layer design and analysis of downlink communications in cellular CDMA systems, EURASIP Journal on Wireless Communications and Networking, 2006:2, (50-50), Online publication date: 2-Apr-2006.
  347. Galinier P and Jaumard B (2006). A Tabu Search algorithm for difference triangle sets and Golomb rulers, Computers and Operations Research, 33:4, (955-970), Online publication date: 1-Apr-2006.
  348. ACM
    Darabkh K and Pan W Stationary queue-size distribution for variable complexity sequential decoders with large timeout Proceedings of the 44th annual Southeast regional conference, (331-336)
  349. ACM
    Atieno L, Allen J, Goeckel D and Tessier R An adaptive Reed-Solomon errors-and-erasures decoder Proceedings of the 2006 ACM/SIGDA 14th international symposium on Field programmable gate arrays, (150-158)
  350. Mitra S and Kim K (2006). XPAND, IEEE Transactions on Computers, 55:2, (163-173), Online publication date: 1-Feb-2006.
  351. Cai H, Zeng B, Shen G, Xiong Z and Li S (2006). Error-resilient unequal error protection of fine granularity scalable video bitstreams, EURASIP Journal on Advances in Signal Processing, 2006, (118-118), Online publication date: 1-Jan-2006.
  352. Hüntemann A, González J and Tapia E Tumor classification from gene expression data Proceedings of the 6th International conference on Biological and Medical Data Analysis, (211-222)
  353. ACM
    Gentry C, Mackenzie P and Ramzan Z Password authenticated key exchange using hidden smooth subgroups Proceedings of the 12th ACM conference on Computer and communications security, (299-309)
  354. ACM
    Dubois-Ferrière H, Estrin D and Vetterli M Packet combining in sensor networks Proceedings of the 3rd international conference on Embedded networked sensor systems, (102-115)
  355. Hosic S, Hocanin A and Demirel H Unequal error protection using convolutional codes for PCA-Coded images Proceedings of the Second international conference on Image Analysis and Recognition, (335-342)
  356. ACM
    Kamra A, Feldman J, Misra V and Rubenstein D (2005). Data persistence in sensor networks, ACM SIGMETRICS Performance Evaluation Review, 33:2, (24-26), Online publication date: 1-Sep-2005.
  357. Parhami B and Rakov M (2005). Perfect Difference Networks and Related Interconnection Structures for Parallel and Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, 16:8, (714-724), Online publication date: 1-Aug-2005.
  358. Sun X, Kim C and Kuo C (2005). MPEG video markup language and its applications to robust video transmission, Journal of Visual Communication and Image Representation, 16:4-5, (589-620), Online publication date: 1-Aug-2005.
  359. Duta S, Mitrea M and Prêteux F Informed watermarking for low rate video Proceedings of the 9th WSEAS International Conference on Communications, (1-6)
  360. ACM
    Koushanfar F, Hong I and Potkonjak M (2005). Behavioral synthesis techniques for intellectual property protection, ACM Transactions on Design Automation of Electronic Systems, 10:3, (523-545), Online publication date: 1-Jul-2005.
  361. Sanctis M, Quaglieri S, Cianca E and Ruggieri M (2005). Energy Efficiency of Error Control for High Data Rate WPAN, Wireless Personal Communications: An International Journal, 34:1-2, (189-209), Online publication date: 1-Jul-2005.
  362. ACM
    Heidergott W SEU tolerant device, circuit and processor design Proceedings of the 42nd annual Design Automation Conference, (5-10)
  363. Kim N and Yoon H (2005). Wireless packet fair queueing algorithms with link level retransmission, Computer Communications, 28:7, (713-725), Online publication date: 1-May-2005.
  364. Li Y and Xia X A family of distributed space-time trellis codes with asynchronous cooperative diversity Proceedings of the 4th international symposium on Information processing in sensor networks, (45-es)
  365. Vellanki P, Banerjee N and Chatha K (2005). Quality-of-service and error control techniques for mesh-based network-on-chip architectures, Integration, the VLSI Journal, 38:3, (353-382), Online publication date: 1-Jan-2005.
  366. Guillemot C and Siohan P (2005). Joint source-channel decoding of variable-length codes with soft information, EURASIP Journal on Advances in Signal Processing, 2005, (906-927), Online publication date: 1-Jan-2005.
  367. Gnaedig D, Boutillon E and Jézéquel M (2005). Design of three-dimensional multiple slice turbo codes, EURASIP Journal on Advances in Signal Processing, 2005, (808-819), Online publication date: 1-Jan-2005.
  368. Babich F, Montorsi G and Vatta F (2005). On rate-compatible punctured turbo codes design, EURASIP Journal on Advances in Signal Processing, 2005, (784-794), Online publication date: 1-Jan-2005.
  369. Bougard B, Rullmann M, Brockmeyer E, Van Der Perre L, Catthoor F and Dehaene W (2005). Energy Efficient Memory Architecture for High Speed Decoding of Block Turbo-Codes with the Fang-Buda Algorithm, Journal of VLSI Signal Processing Systems, 39:1-2, (79-92), Online publication date: 1-Jan-2005.
  370. Omrani R, Moreno O and Kumar P Topics on optical orthogonal codes Proceedings of the Third international conference on Sequences and Their Applications, (396-405)
  371. ACM
    Reyhani-Masoleh A and Hasan M (2004). Towards fault-tolerant cryptographic computations over finite fields, ACM Transactions on Embedded Computing Systems, 3:3, (593-613), Online publication date: 1-Aug-2004.
  372. AlWehaibi A, Kadoch M, Agarwal A and ElHakeem A (2004). Packet loss probability for DiffServ over IP and MPLS reliable homogeneous multicast networks, Information Processing Letters, 90:2, (73-80), Online publication date: 30-Apr-2004.
  373. Karnik T, Hazucha P and Patel J (2004). Characterization of Soft Errors Caused by Single Event Upsets in CMOS Processes, IEEE Transactions on Dependable and Secure Computing, 1:2, (128-143), Online publication date: 1-Apr-2004.
  374. Subramanian L, Stoica I, Balakrishnan H and Katz R OverQos Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, (6-6)
  375. Leininger A, Goessel M and Muhmenthaler P Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Codes Proceedings of the conference on Design, automation and test in Europe - Volume 2
  376. Liu J and Li J (2004). A soft detector with good performance/complexity trade-off for a MIMO system, EURASIP Journal on Advances in Signal Processing, 2004, (1266-1274), Online publication date: 1-Jan-2004.
  377. Redinbo G (2003). Failure-Detecting Arithmetic Convolutional Codes and an Iterative Correcting Strategy, IEEE Transactions on Computers, 52:11, (1434-1442), Online publication date: 1-Nov-2003.
  378. Taşpinar N (2003). Trellis Coded Hybrid Selective Repeat ARQ Schemes for Point-to-Multipoint Communication over Rayleigh Fading Channels, Wireless Personal Communications: An International Journal, 27:2, (117-124), Online publication date: 1-Nov-2003.
  379. Count P and Robertson C Performance of variable bit rate wireless communication systems over Nakagami fading channels Proceedings of the 2003 IEEE conference on Military communications - Volume I, (326-329)
  380. Wu J and Saulnier G Soft output detection of cochannel GMSK signals Proceedings of the 2003 IEEE conference on Military communications - Volume I, (72-77)
  381. ACM
    Bhaskar R, Dubey P, Kumar V and Rudra A Efficient galois field arithmetic on SIMD architectures Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures, (256-257)
  382. ACM
    Matta J, Pépin C, Lashkari K and Jain R A source and channel rate adaptation algorithm for AMR in VoIP using the Emodel Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, (92-99)
  383. Lo H, Lin H, Chen C, Liu J and Liu C (2003). Built-in Test with Modified-Booth High-Speed Pipelined Multipliers and Dividers, Journal of Electronic Testing: Theory and Applications, 19:3, (245-269), Online publication date: 1-Jun-2003.
  384. Lee H (2003). High-speed VLSI architecture for parallel Reed-Solomon decoder, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 11:2, (288-294), Online publication date: 1-Apr-2003.
  385. Chang Y (2003). An Efficient In-Place VLSI Architecture for Viterbi Algorithm, Journal of VLSI Signal Processing Systems, 33:3, (317-324), Online publication date: 1-Mar-2003.
  386. Lee J, Lee J and Sunwoo M (2003). Design of application-specific instructions and hardware accelerator for reed-solomon codecs, EURASIP Journal on Advances in Signal Processing, 2003, (1346-1354), Online publication date: 1-Jan-2003.
  387. Kong J and Parhi K (2003). Interleaved convolutional code and its Viterbi decoder architecture, EURASIP Journal on Advances in Signal Processing, 2003, (1328-1334), Online publication date: 1-Jan-2003.
  388. ACM
    Subramanian L, Stoica I, Balakrishnan H and Katz R (2003). OverQoS, ACM SIGCOMM Computer Communication Review, 33:1, (11-16), Online publication date: 1-Jan-2003.
  389. Madhukumar A and Chin F (2002). Performance Studies of a Reside Number System Based CDMA System over Bursty Communication Channels, Wireless Personal Communications: An International Journal, 22:1, (89-102), Online publication date: 1-Jul-2002.
  390. Clark K, Key J and de Resmini M (2002). Dual Codes of Translation Planes, European Journal of Combinatorics, 23:5, (529-538), Online publication date: 1-Jul-2002.
  391. Choi S (2002). Temporally enhanced erasure codes for reliable communication protocols, Computer Networks: The International Journal of Computer and Telecommunications Networking, 38:6, (713-730), Online publication date: 22-Apr-2002.
  392. Boulgouris N, Kompatsiaris I, Mezaris V, Simitopoulos D and Strintzis M (2002). Segmentation and content-based watermarking for color image and image region indexing and retrieval, EURASIP Journal on Advances in Signal Processing, 2002:4, (418-431), Online publication date: 1-Apr-2002.
  393. Tujkovic D, Juntti M and Latva-aho M (2002). Space-time turbo coded modulation, EURASIP Journal on Advances in Signal Processing, 2002:3, (236-248), Online publication date: 1-Mar-2002.
  394. Boulgouris N, Kompatsiaris I, Mezaris V, Simitopoulos D and Strintzis M (2002). Segmentation and content-based watermarking for color image and image region indexing and retrieval, EURASIP Journal on Advances in Signal Processing, 2002:1, (418-431), Online publication date: 1-Jan-2002.
  395. Tujkovic D, Juntti M and Latva-aho M (2002). Space-time turbo coded modulation, EURASIP Journal on Advances in Signal Processing, 2002:1, (236-248), Online publication date: 1-Jan-2002.
  396. Orten P and Svensson A (2002). Sequential Decoding of Convolutional Codes for Rayleigh Fading Channels, Wireless Personal Communications: An International Journal, 20:1, (61-74), Online publication date: 1-Jan-2002.
  397. Chang J, Choi S and Lee M (2001). New Syndrome Check Error Estimation and Its Concatenated Coding, Wireless Personal Communications: An International Journal, 19:3, (193-204), Online publication date: 1-Dec-2001.
  398. ACM
    Bogliolo A Encodings for high-performance for energy-efficient signaling Proceedings of the 2001 international symposium on Low power electronics and design, (170-175)
  399. Sprachmann M (2001). Automatic Generation of Parallel CRC Circuits, IEEE Design & Test, 18:3, (108-114), Online publication date: 1-May-2001.
  400. Mouaha C and Schiffels G (2001). All q^m -ary CyclicCodes with Cyclic q -ary Image AreKnown, Designs, Codes and Cryptography, 23:1, (81-98), Online publication date: 1-May-2001.
  401. Kousa M (2000). A hybrid ARQ/FEC scheme for noisy ATM network links, Journal of High Speed Networks, 9:3,4, (261-272), Online publication date: 1-Dec-2000.
  402. Yu N, Kim Y and Lee P Iterative Decoding of Product Codes Composed of Extended Hamming Codes Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  403. ACM
    Iren S, Amer P and Conrad P (1999). The transport layer, ACM Computing Surveys, 31:4, (360-404), Online publication date: 1-Dec-1999.
  404. Paar C, Fleischmann P and Soria-Rodriguez P (1999). Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents, IEEE Transactions on Computers, 48:10, (1025-1034), Online publication date: 1-Oct-1999.
  405. ACM
    Hong I and Potkonjak M Behavioral synthesis techniques for intellectual property protection Proceedings of the 36th annual ACM/IEEE Design Automation Conference, (849-854)
  406. (1999). Progressive Video Coding for Noisy Channels, Journal of Visual Communication and Image Representation, 10:2, (173-185), Online publication date: 1-Jun-1999.
  407. Orlando G and Paar C A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
  408. Chisholm G, Eckmann S, Lain C and Veroff R (1999). Understanding Integrated Circuits, IEEE Design & Test, 16:2, (26-37), Online publication date: 1-Apr-1999.
  409. McCanne S (1999). Scalable Multimedia Communication Using IP Multicast and Lightweight Sessions, IEEE Internet Computing, 3:2, (33-45), Online publication date: 1-Mar-1999.
  410. Drolet G (1998). A New Representation of Elements of Finite Fields GF(2m) Yielding Small Complexity Arithmetic Circuits, IEEE Transactions on Computers, 47:9, (938-946), Online publication date: 1-Sep-1998.
  411. Redinbo G (1998). Generalized Algorithm-Based Fault Tolerance, IEEE Transactions on Computers, 47:6, (639-655), Online publication date: 1-Jun-1998.
  412. Roginsky A, Christensen K and Polge S (1998). Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol, Computer Communications, 21:7, (654-661), Online publication date: 1-Jun-1998.
  413. Dlodlo M (1997). Burst-Error Correction Strategies in a Slotted DS-CDMAMobile Satellite Channel, Wireless Personal Communications: An International Journal, 5:2, (155-171), Online publication date: 1-Sep-1997.
  414. Gupta S (1997). Forward error correction and design of spread spectrum based multiple access networks, Computer Communications, 20:7, (554-566), Online publication date: 1-Aug-1997.
  415. Paar C and Soria-Rodriguez P Fast arithmetic architectures for public-key algorithms over Galois fields GF((2n)m) Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (363-378)
  416. Lu C (1997). A Search of Minimal Key Functions for Normal Basis Multipliers, IEEE Transactions on Computers, 46:5, (588-592), Online publication date: 1-May-1997.
  417. Al-Mashouq K (1997). Prediction of Neural Net Tolerance to Noise, Neural Processing Letters, 5:1, (25-34), Online publication date: 1-Feb-1997.
  418. Nagvajara P, Lin J, Nilagupta P and Wang C (1997). Multichip Module Diagnosis by Product-Code Signatures, Journal of Electronic Testing: Theory and Applications, 10:1-2, (127-136), Online publication date: 1-Feb-1997.
  419. Chen C and Curran B (1996). Switching Codes for Delta-I Noise Reduction, IEEE Transactions on Computers, 45:9, (1017-1021), Online publication date: 1-Sep-1996.
  420. Tzeng N and Feng G (1996). Resource Allocation in Cube Network Systems Based on the Covering Radius, IEEE Transactions on Parallel and Distributed Systems, 7:4, (328-342), Online publication date: 1-Apr-1996.
  421. Sung J and Redinbo G (1996). Algorithm-Based Fault Tolerant Synthesis for Linear Operations, IEEE Transactions on Computers, 45:4, (425-438), Online publication date: 1-Apr-1996.
  422. Iwasaki K and Nakamura S (1996). Aliasing Error for a Mask ROM Built-In Self-Test, IEEE Transactions on Computers, 45:3, (270-277), Online publication date: 1-Mar-1996.
  423. Chen C and Gupta S (1996). BIST Test Pattern Generators for Two-Pattern Testing-Theory and Design Algorithms, IEEE Transactions on Computers, 45:3, (257-269), Online publication date: 1-Mar-1996.
  424. ACM
    Sun H and Shieh S Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes Proceedings of the 3rd ACM conference on Computer and communications security, (153-156)
  425. Laih C and Yang C (1996). On the Analysis and Design of Group Theoretical t-syEC/AUED Codes, IEEE Transactions on Computers, 45:1, (103-108), Online publication date: 1-Jan-1996.
  426. Fujiwara T, Feng S, Kasami T and Iwasaki K (1995). On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers, IEEE Transactions on Computers, 44:11, (1265-1274), Online publication date: 1-Nov-1995.
  427. Osone H, Thusoo S, Dharmaraj A and Chia B Error Detection and Handling in a Superscalar, Speculative Out-of-Order Execution Processor System Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
  428. Wurth B and Fuchs K A BIST approach to delay fault testing with reduced test length Proceedings of the 1995 European conference on Design and Test
  429. Gupta I, Chowdhury D and Chaudhuri P (1995). CA-Based Byte Error-Correcting Code, IEEE Transactions on Computers, 44:3, (371-382), Online publication date: 1-Mar-1995.
  430. Saxena N, Chang C, Dawallu K, Kohli J and Helland P (1995). Fault-Tolerant Features in the HaL Memory Management Unit, IEEE Transactions on Computers, 44:2, (170-180), Online publication date: 1-Feb-1995.
  431. Shih C and Batcher K (1994). Adding Multiple-Fault Tolerance to Generalized Cube Networks, IEEE Transactions on Parallel and Distributed Systems, 5:8, (785-792), Online publication date: 1-Aug-1994.
  432. Chowdhury D, Basu S, Gupta I and Chaudhuri P (1994). Design of CAECC - Cellular Automata Based Error Correcting Code, IEEE Transactions on Computers, 43:6, (759-764), Online publication date: 1-Jun-1994.
  433. Wei S (1994). A Systolic Power-Sum Circuit for GF(2/sup m/), IEEE Transactions on Computers, 43:2, (226-229), Online publication date: 1-Feb-1994.
  434. Chen H and Tzeng N (1994). Efficient Resource Placement in Hypercubes Using Multiple-Adjacency Codes, IEEE Transactions on Computers, 43:1, (23-33), Online publication date: 1-Jan-1994.
  435. Vaidya N and Pradhan D (1993). Fault-Tolerant Design Strategies for High Reliability and Safety, IEEE Transactions on Computers, 42:10, (1195-1206), Online publication date: 1-Oct-1993.
  436. Krishna H and Sun J (1993). On Theory and Fast Algorithms for Error Correction in Residue Number System Product Codes, IEEE Transactions on Computers, 42:7, (840-853), Online publication date: 1-Jul-1993.
  437. Redinbo G, Napolitano L and Andaleon D (1993). Multibit Correcting Data Interface for Fault-Tolerant Systems, IEEE Transactions on Computers, 42:4, (433-446), Online publication date: 1-Apr-1993.
  438. Pradham D and Gupta S (1991). A New Framework for Designing and Analyzing BIST Techniques and Zero Aliasing Compression, IEEE Transactions on Computers, 40:6, (743-763), Online publication date: 1-Jun-1991.
  439. Hortensius P, McLeod R and Card H (1990). Cellular Automata-Based Signature Analysis for Built-In Self-Test, IEEE Transactions on Computers, 39:10, (1273-1283), Online publication date: 1-Oct-1990.
  440. Anfinson J and Luk F (1988). A Linear Algebraic Model of Algorithm-Based Fault Tolerance, IEEE Transactions on Computers, 37:12, (1599-1604), Online publication date: 1-Dec-1988.
  441. Brosnan T and Strader N (1988). Modular Error Detection for Bit-Serial Multiplication, IEEE Transactions on Computers, 37:9, (1043-1052), Online publication date: 1-Sep-1988.
  442. Deng R and Costello D (1987). Decoding of DBEC-TBED Reed-Solomon codes, IEEE Transactions on Computers, 36:11, (1359-1363), Online publication date: 1-Nov-1987.
  443. Thomas J and Parker S (1987). Implementing Exact Calculations in Hardware, IEEE Transactions on Computers, 36:6, (764-768), Online publication date: 1-Jun-1987.
  444. Kim M (1986). Synchronized Disk Interleaving, IEEE Transactions on Computers, 35:11, (978-988), Online publication date: 1-Nov-1986.
  445. ACM
    Chen C (1984). Error-correcting codes for semiconductor memories, ACM SIGARCH Computer Architecture News, 12:3, (245-247), Online publication date: 1-Jun-1984.
  446. ACM
    Chen C Error-correcting codes for semiconductor memories Proceedings of the 11th annual international symposium on Computer architecture, (245-247)
  447. Wang Y, Li W and Lu S The Capability of Error Correction for Burst-Noise Channels Using Error Estimating Code 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), (1-9)
  448. Yan K, Wu H, Zhou H and Xiao H Novel M-ary coded modulation scheme based on constellation subset selection 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (207-211)
  449. Buzaglo S, Yaakobi E, Cassuto Y and Siegel P Consecutive switch codes 2016 IEEE International Symposium on Information Theory (ISIT), (660-664)
  450. Yue C, Shirvanimoghaddam M, Li Y and Vucetic B Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Contributors
  • University of California, Davis
  • University of Notre Dame

Recommendations

Reviews

Vladimir Botchev

The first edition of this book [1] is probably one of the most popular books for teaching error correcting coding. It has proven itself as an extremely valuable reference-for teaching classes, self-study, and even software/hardware design-for more than 20 years. Since 1982, error correcting coding has become ubiquitous in everyday products like compact disc (CD) players and broadband modems, and new or revised coding paradigms have entered the scene; it was obvious that a new edition would be more than welcome, specifically, an edition addressing the evolution of the discipline during that time span. Other excellent works on this subject have been published during the last 20 years. None, however, have offered the authors' unique tutorial style and careful presentation, using a generous number of block diagrams, graphs, and step-by-step introductions to key algorithms. In this respect, the new edition doesn't disappoint; the style remains excellent, and the diagrams and graphs are even better. The old topics discussed remain almost unchanged, the coverage of Reed Solomon is slightly expanded, and new or enhanced coverage is included for convolutional coding, trellis coded modulation, turbo coding, low density parity check (LDPC) codes, and the soft decoding of block codes, to cite the most important. The coverage is very detailed; the book has an impressive 1,200-plus page count. Excellent end-of-chapter problems are provided, many with solution hints. A companion Web page is under construction. One could be tempted to give this impressive book the title Bible of error correcting coding theory and practice. In a certain sense, it is, given its broad coverage, detailed examples, and extensive references. Despite all of its qualities, however, certain aspects of the book still leave something to be desired. For example, the ubiquitous cousin of error checking and correcting (ECC), error-detecting cyclic redundancy checking (CRC) coding, is only skimmed over. In a book of this size, I would expect somewhat more detail on CRC. The introduction to finite fields and corresponding arithmetic structures, while excellent, is not changed from the first edition. For example, no explanation is given as to how it happens that extension fields exist for GF(2^m) , or, for that matter, GF(p^m) , where p is prime. They are just said to exist. A demonstration using available tools and concepts from this chapter is totally within reach; a page or two would suffice (like in the excellent book by Pretzel [2]). Reed Solomon codes are essentially codes for correcting burst errors, and they are helped in that by convolutional interleavers (for example, the asymmetric digital subscriber line (ADSL) standard). A page or two would have been enough to introduce this important topic in more detail, yet the authors did not do this. I prefer to keep this list of omissions short, because these details, even if important, can be learned from easily accessible papers and tutorials, and do not really weaken the main text. However, given the book's size, a few more pages wouldn't have hurt the authors or publisher, and would have only been of benefit to the student. There are student reports from classes where this book (in its first edition) is dominantly used that some fine points, especially in Reed Solomon decoding, are just listed, with no proof provided. And very often, when learning a specific discipline, people would like to know the why, not only the how. The situation is better in this edition, however I again found quite inadmissible statements, such as the one on page 210: "The proof of this is quite complicated and is omitted from this introductory book," in reference to the minimum degree error location polynomial satisfying the first M Newton identities, where M is equal to the number of discrepancies plus 1. The proof is indeed involved, but nonetheless within reach given the finite field basics taught as part of this book. There could at least be an appendix, with this (and other) proofs, for students who want to know why, not only how. Who could reasonably expect that, given a manual of this size, the number of such sentences would be virtually zero__?__ That's exactly the approach taken by Rhee, however, in his excellent book [3]. So for proof of the above, turn to Rhee's book, or to the original reference by Peterson and Weldon [4] (not even mentioned in the expression context in this book). Overall, this is an impressive reference for learning error correcting codes. Be warned, however, about surprises when a "Why__?__" question is posed. The answer may very well be missing. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.