Sciweavers

5 search results - page 1 / 1
» On Determining Deep Holes of Generalized Reed-Solomon Codes
Sort
View
TAMC
2007
Springer
14 years 7 days ago
On Deciding Deep Holes of Reed-Solomon Codes
For generalized Reed-Solomon codes, it has been proved [7] that the problem of determining if a received word is a deep hole is coNP-complete. The reduction relies on the fact that...
Qi Cheng, Elizabeth Murray
FPGA
2006
ACM
195views FPGA» more  FPGA 2006»
13 years 9 months ago
An adaptive Reed-Solomon errors-and-erasures decoder
The development of Reed-Solomon (RS) codes has allowed for improved data transmission over a variety of communication media. Although Reed-Solomon decoding provides a powerful def...
Lilian Atieno, Jonathan Allen, Dennis Goeckel, Rus...
ISSTA
2009
ACM
14 years 19 days ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
JSAC
2000
134views more  JSAC 2000»
13 years 5 months ago
Adaptive multidimensional coded modulation over flat fading channels
We introduce a general adaptive coding scheme for Nakagami multipath fading channels. An instance of the coding scheme utilizes a set of 2 -dimensional (2 -D) trellis codes origina...
Kjell Jørgen Hole, Henrik Holm, Geir E. &Os...
NDSS
2008
IEEE
14 years 15 days ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...