نتایج جستجو برای: error identification techniques

تعداد نتایج: 1229110  

2011
Rubal Chaudhary Vrinda Gupta

This paper is an introduction to the subject of error-control coding. Undesirable disturbances like noise, EMI, crosstalk can occur across the communication channel, causing the received information to be different from the original information sent. So to remove this we need some methods to detect as well as correct errors. This paper presents in a tutorial form a survey of the old and recent,...

2010
Kahraman Daglar Akdemir Berk Sunar Xinming Huang Gunnar Gaubatz Fred J. Looft

“Side channel” attacks (SCA) pose a serious threat on many cryptographic devices and are shown to be effective on many existing security algorithms which are in the black box model considered to be secure. These attacks are based on the key idea of recovering secret information using implementation specific side-channels. Especially active fault injection attacks are very effective in terms of ...

2006
Peter Vlugter Edwin van der Ham Alistair Knott

This paper describes a mechanism for identifying errors made by a student during a computer-aided language learning dialogue. The mechanism generates a set of ‘perturbations’ of the student’s original typed utterance, each of which embodies a hypothesis about an error made by the student. Perturbations are then passed through the system’s ordinary utterance interpretation pipeline, along with t...

Journal: :TBC 2002
Jae-Won Suh Yo-Sung Ho

Compressed video bitstreams are intended for real-time transmission over communication networks. Most of the video coding standards employ the temporal and spatial prediction structure to reduce the transmitted video data. Therefore, the coded video bitstreams are highly sensitive to information loss and channel errors. Even a single bit error can lead to disastrous quality degradation in both ...

2001
Subhasish Mitra Edward J. McCluskey

This technical report contains the text of Subhasish Mitra’s PhD thesis “Diversity Techniques for Concurrent Error Detection.” Funding: This research was supported by the Advanced Research Projects Agency under Contract No. DABT63-97-C-0024. Copyright © 2000 by Subhasish Mitra. All rights reserved, including the right to reproduce this report, or portions thereof, in any form.

2015
Rémi Géraud Diana Maimut David Naccache Rodrigo Portella do Canto Emil Simion

Modular reduction is the basic building block of many publickey cryptosystems. BCH codes require repeated polynomial reductions modulo the same constant polynomial. This is conceptually very similar to the implementation of public-key cryptography where repeated modular reduction in Zn or Zp are required for some fixed n or p. It is hence natural to try and transfer the modular reduction expert...

Journal: :IBM Journal of Research and Development 1979
Richard E. Blahut

By using the theory ofjinite5eld Fourier transforms, the subject of rror control codes is described in N language familiar to thejield of signal processing. The many importunt uses of spectral techniques in error control are summarized. Many classes of linear codes are given a spectral interpretation and some new codes are described, Several nlternative encoder1 decoder schemes are described by...

2003
Guanghui Li Ming Shao Xiaowei Li

Error diagnosis is becoming more difficult in VLSI circuit designs due to the increasing complexity. In this paper, we present an algorithm based on verification for improving the accuracy of design error diagnosis. This algorithm integrates three-valued logic simulation and Boolean satisfiability(SAT). It uses test patterns generated by gate level stuck-at fault ATPG tool for parallel pattern ...

Journal: :EURASIP J. Wireless Comm. and Networking 2008
Yonghui Li Jinhong Yuan Andrej Stefanov Branka Vucetic

In the past decade, a significant progresshas been reported in the field of error control coding. In particular, the innovation ofturbo codes and rediscovery of LDPC codes have been recognized as two significant breakthroughs in this field. The distinct features of these capacity approaching codes have enabled them to be widely proposed and/or adopted in existing wireless standards. Furthermore...

1995
Paul Salama Ness B. Shroff Edward J. Coyle Edward J. Delp

In this paper we describe two error-recovery approaches for MPEG encoded video over ATM networks. The first approach aims at reconstructing each lost pixel by spatial interpolation from the nearest undamaged pixels. The second approach recovers lost macroblocks by minimizing intersample variations within each block and across its boundaries. Moreover, a new technique for packing ATM cells with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید