Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Error Detecting and Error Correcting Codes - MaRDI portal

Error Detecting and Error Correcting Codes

From MaRDI portal
Publication:4611066

DOI10.1002/j.1538-7305.1950.tb00463.xzbMath1402.94084WikidataQ55871133 ScholiaQ55871133MaRDI QIDQ4611066

Richard Hamming

Publication date: 23 January 2019

Published in: Bell System Technical Journal (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Robust variable selection for model-based learning in presence of adulterationStructural relatedness via flow networks in protein sequence spaceDistance measures with heavy aggregation operatorsIncidence coloring on hypercubesPerfect codes in Doob graphsDesign of \(\mathcal{T}\)-\textit{direct} codes over \(\mathrm{GF}(2^N)\) with increased usersA re-characterization of the Kemeny distanceSearch problems: One, two or many roundsOn generalizations of separating and splitting familiesWavelet analysis on symbolic sequences and two-fold de Bruijn sequencesInteractive communication with unknown noise rateHeuristic approaches for biobjective mixed 0-1 integer linear programming problemsClassical simulated annealing using quantum analoguesSur le nombre domatique du n-cube et une conjecture de Zelinka. (On the domatic number of the n-cube and a conjecture of Zelinka)An efficient image authentication method based on Hamming codeA column generation approach to extend lifetime in wireless sensor networks with coverage and connectivity constraintsApplications of coding theory to the design of somatic cell hybrid panelsAn exact algorithm for biobjective mixed integer linear programming problemsInterdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker modelA t-unidirectional error-detecting systematic codeHierarchical parallel evaluation of a Hamming codeA bound for codes correcting random and low-density closed-loop burst errorsIterative voting and acyclic gamesAsymptotic stability in probability for stochastic Boolean networksA comparison of three metaheuristics for the workover rig routing problemThe design of a reliable and robust hierarchical health service network using an accelerated Benders decomposition algorithmAmbulance location and relocation problems with time-dependent travel timesOptimal low-power coding for error correction and crosstalk avoidance in on-chip data busesSmall weight bases for Hamming codesWeb mining with relational clusteringBlockwise Lee error-correcting codesNecessary and sufficient number of parity checks in codes correcting random errors and bursts with weight constraints under a new metricOn perfect codes in Cartesian products of graphsA bound for random and closed loop burst error detecting codesDetermining all indecomposable codes over some Hopf algebrasPeriod recovery of strings over the Hamming and edit distancesAn upper bound for codes detecting low-density closed-loop burstsModeling value disagreementSequence matching with binary codesSystematic t-error correcting/all unidirectional error detecting codes with easy encoding/decodingA new class of symmetric error correcting/unidirectional error detecting codesSymmetric vertex partitions of hypercubes by isometric treesProbing the protein space for extending the detection of weak homology foldsTolerance spaces: origins, theoretical aspects and applicationsCharge and reduce: A fixed-parameter algorithm for string-to-string correctionA new upper bound on nonbinary block codesPrefix partitioned Gray codes for particular cross-bifix-free setsHamming code based watermarking scheme for 3D model verificationLower bounds for centered and wrap-around \(L_2\)-discrepancies and construction of uniform designs by threshold accepting.Text indexing with errorsThe sextuply shortened binary Golay code is optimalThe quest for a quantum neural networkGroup homomorphisms as error correcting codesAdversarial classification using signaling games with an application to phishing detectionCodes, cubes, and graphical designsA novel lossless data compression scheme based on the error correcting Hamming codesAn algorithm for approximating the Pareto set of the multiobjective set covering problemLogic of confidenceA perturbation matheuristic for the integrated personnel shift and task re-scheduling problemA variable-neighbourhood search algorithm for finding optimal run orders in the presence of serial correlationSynthesis of self-checking combination devices based on allocating special groups of outputsCorrigendum to: ``Incidence coloring on hypercubes.Genetic algorithms in coding theory -- a table for \(A_ 3(n, d)\)Optimal aggregation of linear time series modelsThe search-and-remove algorithm for biobjective mixed-integer linear programming problemsEfficient algorithms for the block edit problemsThe effect of the asymmetry of road transportation networks on the traveling salesman problemNetwork design model to integrate shelter assignment with contraflow operations in emergency evacuation planningConnectivity and edge-bipancyclicity of Hamming shellSimplified forms of computerized reasoning with distance semanticsUnrestricted codes with the Golay parameters are uniqueThe intractability of computing the Hamming distanceOn kernels of perfect codesCharacterizing permissibility, proper rationalizability, and iterated admissibility by incomplete informationM-theory cosmology, octonions, error correcting codesSome bounds on the complexity of predicate recognition by finite automataBounds on the number of Hamiltonian circuits in the n-cubeThe uncertain probabilistic OWA distance operator and its application in group decision makingContributions to the geometry of Hamming spacesOn 2-dimensional insertion-deletion Reed-Solomon codes with optimal asymptotic error-correcting capabilityPerfect codes from the dual point of view. ISkew constacyclic codes over finite fields and finite chain ringsThe maximum diversity assortment selection problemThe existence of perfect codes in a family of generalized Fibonacci cubesProbabilistic OWA distances applied to asset managementStochastic modeling western paintings for effective classificationA characterization of some \([n,k,d;q\)-codes meeting the Griesmer bound using a minihyper in a finite projective geometry] ⋮ A construction of some \([n,k,d;q\)-codes meeting the Griesmer bound] ⋮ The exact multiple pattern matching problem solved by a reference tree approachFull rank perfect codes and \(\alpha \)-kernelsSimulation distancesHow to choose a fair delegation?Application of \(\mathcal{T}\)-direct codes in multiple-rate codesHamming distance for conjugatesHamming and simplex codes for the sum-rank metricOn the classification of perfect codes: extended side class structuresVariable-length codes independent or closed with respect to edit relationsStrings from linear recurrences and permutations: a gray codeTwo-weight ternary codes and the equation \(y^2=4 \times 3^\alpha+13\)Acceleration strategies of Benders decomposition for the security constraints power system expansion planning




This page was built for publication: Error Detecting and Error Correcting Codes