Computational complexity: a conceptual perspective

O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …

Modulation and coding for linear Gaussian channels

GD Forney, G Ungerboeck - IEEE Transactions on Information …, 1998 - ieeexplore.ieee.org
Shannon's determination of the capacity of the linear Gaussian channel has posed a
magnificent challenge to succeeding generations of researchers. This paper surveys how …

[图书][B] Information theory, inference and learning algorithms

DJC MacKay - 2003 - books.google.com
Information theory and inference, often taught separately, are here united in one entertaining
textbook. These topics lie at the heart of many exciting areas of contemporary science and …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

A recursive approach to low complexity codes

R Tanner - IEEE Transactions on information theory, 1981 - ieeexplore.ieee.org
A method is described for constructing long error-correcting codes from one or more shorter
error-correcting codes, referred to as subcodes, and a bipartite graph. A graph is shown …

[PDF][PDF] Near Shannon limit performance of low density parity check codes

DJC MacKay, RM Neal - Electronics letters, 1997 - docs.switzernet.com
We report the empirical performance of Gallager's low density parity check codes on
Gaussian channels. We show that performance substantially better than that of standard …

Good error-correcting codes based on very sparse matrices

DJC MacKay - IEEE transactions on Information Theory, 1999 - ieeexplore.ieee.org
We study two families of error-correcting codes defined in terms of very sparse matrices."
MN"(MacKay-Neal (1995)) codes are recently invented, and" Gallager codes" were first …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

[图书][B] Communication system engineering

JG Proakis, M Salehi - 2023 - 103.76.208.7
COMMUNICATION SYSTEMS ENGINEERING Page 1 COMMUNICATION SYSTEMS
ENGINEERING John G. Proakis Masoud Salehi 2nd Ed. Upper Saddle River, New Jersey 07458 …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, R Ostrovsky, L Reyzin, A Smith - SIAM journal on computing, 2008 - SIAM
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …