Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reed-Solomon codes
biblio
Effectiveness Improvement of Offset Pulse Position Modulation System Using Reed-Solomon Codes
Submitted by grigby1 on Mon, 07/31/2023 - 3:48pm
pubcrawl
Metrics
resilience
composability
Reed-Solomon codes
encoding
Bandwidth
human computer interaction
modulation
forward error correction
Resiliency
codes
Offset pulse position modulation
Reed Solomon
biblio
Forward Error Correction Applied to JPEG-XS Codestreams
Submitted by grigby1 on Mon, 07/31/2023 - 3:47pm
pubcrawl
Metrics
resilience
composability
Reed-Solomon codes
Redundancy
forward error correction
Image coding
Propagation losses
Resiliency
Image quality
JPEG-XS
Rate-distortion
Unequal Error Protection
biblio
Rate Adaptive Reconciliation Based on Reed-Solomon Codes
Submitted by grigby1 on Fri, 09/16/2022 - 3:53pm
security
pubcrawl
Metrics
wireless sensor networks
Wireless communication
composability
Reed-Solomon codes
Quantization (signal)
Physical layer
forward error correction
key generation
Resiliency
Information filters
information reconciliation
rate adaptive
Zigbee
biblio
Doubly-Exponential Identification via Channels: Code Constructions and Bounds
Submitted by grigby1 on Fri, 07/01/2022 - 7:29am
security
pubcrawl
resilience
Correlation
Reed-Solomon codes
Metrics
Decoding
Upper bound
coding theory
optical receivers
Resiliency
biblio
Methods and Algorithms for Generating a Storage Key Based on Biometric Parameters
Submitted by grigby1 on Tue, 06/14/2022 - 2:15pm
neural network
Radon transform
bio key
biometrics
biometrics (access control)
Algorithm
Transforms
biometric encryption
automation
information security
Software algorithms
Metrics
Reed-Solomon codes
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Decoding of Interleaved Linearized Reed-Solomon Codes with Applications to Network Coding
Submitted by aekwall on Tue, 03/01/2022 - 3:26pm
simulation
pubcrawl
Resiliency
composability
Probabilistic logic
cyber-physical systems
Decoding
Predictive Metrics
Reed-Solomon codes
Upper bound
network coding
error correction
multishot network coding
multishot operator channel
subspace codes
sum-rank metric
biblio
An Anti-Collusion Fingerprinting based on CFF Code and RS Code
Submitted by aekwall on Tue, 10/12/2021 - 2:21pm
Fingerprint recognition
Reed-Solomon codes
Reed-Solomon code
leak traceability
digital fingerprinting
Data Security
concatenated coding
Collusion Attacks
CFF
Provenance
Organizations
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
Resists
biblio
Visual Authentication Scheme Based on Reversible Degradation and QR Code
Submitted by grigby1 on Tue, 08/31/2021 - 11:57am
2D Barcode
authentication
Cryptography
Decoding
Degradation
image authentication
Meaningless Reversible Degradation
pubcrawl
QR codes
Redundancy
Reed-Solomon codes
resilience
Resiliency
Visual Authentication
visualization
biblio
PAIR: Pin-aligned In-DRAM ECC architecture using expandability of Reed-Solomon code
Submitted by aekwall on Mon, 03/22/2021 - 12:09pm
In-DRAM ECC
Resiliency
Reliability
Reed-Solomon codes
Reed-Solomon code
pubcrawl
process scaling
pin-aligned In-DRAM ECC architecture
performance degradation
PAIR
numerous inherent faults
In-DRAM Error Correcting Code
Compositionality
expandability
error correction codes
error correction
ECC codewords
DRAM vendors
DRAM chips
DRAM
DQ pin lines
density
computer systems
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
secure authentication
Fuzzy Cryptography
transmission data
Reed Solomon codes
recognition rate results
key agreement
IoT actors
fuzzy vault principle
fuzzy extractor-based key agreement
effective key agreement scheme
computation times
Biometric cryptosystem
Hamming codes
fuzzy extractor
Scalability
data exchange
Reed-Solomon codes
biometrics (access control)
sensors
public key cryptography
fuzzy set theory
authentication
Metrics
pubcrawl
Resiliency
feature extraction
Internet of Things
Cryptography
1
2
3
next ›
last »