A Soft-Input And Output Iterative Bounded-Distance And Encoding-Based Decoding Algorithm For Product Codes | 0 | 0.34 | 2009 |
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code | 0 | 0.34 | 2007 |
Selection of Test Patterns in an Iterative Erasure and Error Decoding Algorithm for Non-binary Block Codes | 1 | 0.35 | 2006 |
Stochastic multiple context-free grammar for RNA pseudoknot modeling | 9 | 0.68 | 2006 |
On the Generative Power of Grammars for RNA Secondary Structure. | 0 | 0.34 | 2005 |
On The Generative Power Of Grammars For Rna Secondary Structure | 4 | 0.56 | 2005 |
Subclasses of Tree Adjoining Grammar for RNA Secondary Structure | 0 | 0.34 | 2004 |
On binary images of shortened cyclic (8, 5) codes over GF(28). | 0 | 0.34 | 2004 |
Selection Method Of Test Patterns In Soft-Decision Iterative Bounded Distance Decoding Algorithms | 0 | 0.34 | 2003 |
A Soft-Decision Iterative Decoding Algorithm Using A Top-Down And Recursive Minimum Distance Search | 0 | 0.34 | 2002 |
On the binary images of (8, 5) shortened cyclic codes over GF(28). | 0 | 0.34 | 2001 |
Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms | 0 | 0.34 | 2001 |
On Integer Programming Problems Related to Soft-Decision Iterative Decoding Algorithms | 4 | 0.57 | 1999 |
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity | 2 | 0.48 | 1999 |
Solving a unification problem under constrained substitutions using tree automata | 9 | 0.95 | 1997 |
The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin | 0 | 0.34 | 1997 |
A secure code for recipient watermarking against conspiracy attacks by all users | 4 | 0.50 | 1997 |
A phase connection method for communication protocols | 0 | 0.34 | 1996 |
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers | 0 | 0.34 | 1995 |
The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars | 4 | 0.44 | 1994 |
On the maximum value of aliasing probabilities for single input signature registers | 1 | 0.36 | 1993 |
A translation method from natural language specifications into formal specifications using contextual dependencies | 13 | 3.84 | 1993 |
Parallel multiple context-free grammars, finite-state translation systems, and polynomial-time recognizable subclasses of lexical-functional grammars | 4 | 0.62 | 1993 |
A method for translating natural language program specifications into algebraic specifications | 0 | 0.34 | 1992 |
A Verification Procedure via Invariant for Extended Communicating Finite-State Machines | 2 | 0.40 | 1992 |
A defect-tolerant design for mask ROMs | 5 | 0.58 | 1992 |
The generative power of multiple context-free grammars and head grammars | 0 | 0.34 | 1991 |
Optimizing universal queries in relational databases | 0 | 0.34 | 1991 |
On multiple context-free grammars | 148 | 7.82 | 1991 |
Membership problem for head languages and multiple context-free languages. | 4 | 1.66 | 1989 |
Generalized context-free grammars and multiple context-free grammars. | 6 | 1.39 | 1989 |
Verification of safeness and mutual exclusion properties of algebraically specified token ring LAN protocol. | 0 | 0.34 | 1989 |
Logical programming for the telegram analysis problem | 1 | 0.35 | 1987 |
Principles of algebraic language ASL. | 3 | 0.96 | 1987 |
Verification of progress property of algebraically specified communication protocols. | 0 | 0.34 | 1987 |
Decision problem concerning security for cryptographic protocols. | 1 | 0.42 | 1987 |
An Approximation To The Weight Distribution Of Binary Primitive Bch Codes With Designed Distance-9 And Distance-11 | 2 | 0.48 | 1986 |
Compiling and optimizing methods for the functional language ASL/F | 7 | 1.86 | 1986 |
Some Results On The Representative Instance In Relational Databases | 23 | 4.86 | 1985 |
A distributed mutual exclusion algorithm | 188 | 23.95 | 1985 |
Optimization of functional language ASL/F programs. | 1 | 0.87 | 1985 |
An approximation to the weight distribution of binary linear codes | 24 | 2.96 | 1985 |
Membership Problems For Data Dependencies In Relational Expressions | 5 | 0.39 | 1984 |
Functional programming and logical programming for the telegram analysis problem | 4 | 0.72 | 1984 |
An Algebraic Specification of HDLC Procedures and Its Verification | 11 | 2.12 | 1984 |
Three Measures for Synchronic Dependence in Petri Nets | 15 | 5.68 | 1983 |
Membership Problem For Embedded Multivalued Dependencies Under Some Restricted Conditions | 1 | 0.85 | 1983 |
Linear block codes for error detection | 11 | 1.59 | 1983 |
Existence of Good δ-Decodable Codes for the Two-User Multiple-Access Adder Channel | 1 | 0.54 | 1980 |
Decision Problems For Multivalued Dependencies In Relational Databases | 27 | 6.16 | 1979 |