Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic E. - Data
Topic E.4 - CODING AND INFORMATION THEORY

A.A. Al-Saggaf:
Secure Method for Combining Cryptography with Iris Biometrics
/jucs_24_4/secure_method_for_combining
page 341 - 356
Vol.24 / Issue 4
B. Alomair, R. Poovendran:
Information Theoretically Secure Encryption with Almost Free Authentication
/jucs_15_15/information_theoretically_secure_encryption
page 2937 - 2956
Vol.15 / Issue 15
R. Bent, M. Schear, L. A. Hemaspaandra, G. Istrate:
A Note on Bounded-Weight Error-Correcting Codes
/jucs_5_12/a_note_on_bounded
page 817 - 827
Vol.5 / Issue 12
Y. Chen, O.O. Koyluoglu, A.J.H. Vinck:
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
/jucs_25_8/secrecy_over_multiple_access
page 904 - 924
Vol.25 / Issue 8
D. Cristofor, D. Simovici:
Finding Median Partitions Using Information-Theoretical-Based Genetic Algorithms
/jucs_8_2/finding_median_partitions_using
page 153 - 172
Vol.8 / Issue 2
R.W. Doran:
The Gray Code
/jucs_13_11/the_gray_code
page 1573 - 1597
Vol.13 / Issue 11
P. Fenwick:
A Note on Variable-Length Codes with Constant Hamming Weights
/jucs_21_9/a_note_on_variable
page 1136 - 1142
Vol.21 / Issue 9
P. Fenwick:
Symbol Ranking Text Compression with Shannon Recodings
/jucs_3_2/symbol_ranking_text_compression
page 70 - 85
Vol.3 / Issue 2
A.-B. Gil, F.J. García-Peñalvo:
Learner Course Recommendation in e-Learning Based on Swarm Intelligence
/jucs_14_16/learner_course_recommendation_in
page 2737 - 2755
Vol.14 / Issue 16
M. Haroutunian, K. Mkhitaryan, J. Mothe:
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms
/jucs_25_8/a_new_information_theoretical
page 887 - 903
Vol.25 / Issue 8
I. Honkala, A. Lobstein:
On Identification in ZZ2 Using Translates of Given Patterns
/jucs_9_10/on_identification_in_zz2
page 1204 - 1219
Vol.9 / Issue 10
B. Liu, B. Zhao, B. Liu, C. Wu:
A Security Real-time Privacy Amplification Scheme in QKD System
/jucs_19_16/a_security_real_time
page 2420 - 2436
Vol.19 / Issue 16
X. Liu, J. Liu, K.-Y. Yoo, H. Cho:
Low Complexity H.264/AVC Intraframe Coding for Wireless Multimedia Sensor Network
/jucs_18_9/low_complexity_H_264
page 1177 - 1193
Vol.18 / Issue 9
Z. Marszałek:
Parallel Fast Sort Algorithm for Secure Multiparty Computation
/jucs_24_4/parallel_fast_sort_algorithm
page 488 - 514
Vol.24 / Issue 4
O. Pérez, Y. Berviller, C. Tanougast, S. Weber:
The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation
/jucs_13_3/the_use_of_runtime
page 349 - 362
Vol.13 / Issue 3
H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
/jucs_25_9/steganalysis_of_adaptive_multi
page 1131 - 1150
Vol.25 / Issue 9
J. Yang, U. Speidel:
A Fast T-decomposition Algorithm
/jucs_11_6/a_fast_t_decomposition
page 1083 - 1101
Vol.11 / Issue 6