Search

Showing total 2,730 results

Search Constraints

Start Over You searched for: Topic binary codes Remove constraint Topic: binary codes Language english Remove constraint Language: english
2,730 results

Search Results

151. Non-binary codes approach on the performance of short-packet full-duplex transmissions.

152. Asymmetric similarity-preserving discrete hashing for image retrieval.

153. Entanglement-assisted binary quantum codes from skew cyclic codes over F2×(F2+vF2).

154. Joint and Individual Feature Fusion Hashing for Multi-modal Retrieval.

155. A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring F2r[u]/<ue>.

156. Learning binary codes for fast image retrieval with sparse discriminant analysis and deep autoencoders.

157. On improvability of hash clustering data from different sources by bipartite graph.

158. Cancelable Multibiometrics Template Security Using Deep Binarization and Secure Hashing.

159. On the binary codes of length 552 which admit the simple group Co3 as a transitive permutation group.

160. A Survey of Full-Cycle Cross-Modal Retrieval: From a Representation Learning Perspective.

161. EFFICIENT LINEAR AND AFFINE CODES FOR CORRECTING INSERTIONS/DELETIONS.

162. Optimal quaternary Hermitian LCD codes and their related codes.

163. Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts.

164. Multi-semantic feature fusion attention network for binary code similarity detection.

165. Binary Fuzzy Codes and Some Properties of Hamming Distance of Fuzzy Codes.

166. A randomized Bayesian optimal phase II design with binary endpoint.

167. An Online Hashing Algorithm for Image Retrieval Based on Optical-Sensor Network.

168. Lower Bounds for Quasi-Cyclic Codes and New Binary Quantum Codes.

169. A Conversation History-Based Q&A Cache Mechanism for Multi-Layered Chatbot Services.

170. Discriminative Triad Matching and Reconstruction for Weakly Referring Expression Grounding.

171. BATCH: A Scalable Asymmetric Discrete Cross-Modal Hashing.

172. Polar Coding for Channels With Deletions.

173. Matching Pursuit Algorithm for Decoding of Binary LDPC Codes.

174. Small Binary Codebook Design for Image Compression Depending on Rotating Blocks.

175. Statistical Learning in Medical Research with Decision Threshold and Accuracy Evaluation.

176. On Learning Semantic Representations for Large-Scale Abstract Sketches.

177. Bit Error Probability Performance of Binary Dimmable Visible Light Communication Systems.

178. Binary linear codes with few weights from Boolean functions.

179. Projective binary linear codes from special Boolean functions.

180. Corporate governance and financial distress: Asian emerging market perspective.

181. Binary Code Similarity Detection through LSTM and Siamese Neural Network.

182. Capacity Optimality of AMP in Coded Systems.

183. Fast Algebraic Immunity of Boolean Functions and LCD Codes.

184. Optimal Steganographic Method Based on Image Encryption.

185. A note on the construction and enumeration of Euclidean self-dual skew-cyclic codes.

186. Geometric Approach to b-Symbol Hamming Weights of Cyclic Codes.

187. New Construction of Optimal Type-II Binary Z-Complementary Pairs.

188. Butson full propelinear codes.

189. PN Codes Estimation of Binary Phase Shift Keying Signal Based on Sparse Recovery for Radar Jammer.

190. Design of a Low-Power and Low-Area 8-Bit Flash ADC Using a Double-Tail Comparator on 180 nm CMOS Process.

191. Lossless Image Coding Using Non-MMSE Algorithms to Calculate Linear Prediction Coefficients.

192. Self-orthogonal codes constructed from weakly self-orthogonal designs invariant under an action of M11.

193. A new class of distance-optimal binary cyclic codes and their duals.

194. A NEW IMPROVED BINARY CONVOLUTIONAL MODEL FOR CLASSIFICATION OF IMAGES.

195. Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers.

196. Unleashing the power of pseudo-code for binary code similarity analysis.

197. Contrastive hashing with vision transformer for image retrieval.

198. Multigranularity semantics based vulnerability search method for cross‐platform binary.

199. Intelligent Predicting Method for Optimizing Remote Loading Efficiency in Edge Service Migration.

200. Binary [ n , (n + 1)/2] Cyclic Codes With Good Minimum Distances.