Cryptography Reference
In-Depth Information
[HAG 88] J. Hagenauer. Rate-Compatible Punctured Convolutional Codes
(RCPC Codes) and their Applications. IEEE Trans. on Com.,
1988, 389-400.
[HAH 89] J. Hagenauer, P. Hoeher. A Viterbi Algorithm with Soft-Decision
Outputs and its Applications. IEEE, Globecom 1989, 1680-1686.
[HAG 94] J. Hagenauer. Soft is better than hard. In: R.E. Blahut, D.J.
Costello, U. Maurer, T. Mittelholzer (Hrsg.): Communications and
Cryptography - Two Sides of One Tapestry, 1994, 155-171.
[HAO 96] J. Hagenauer, E. Offer, L. Papke. Iterative Decoding of Binary
Block and Convolutional Codes. IEEE Trans. on Inform. Theory,
1996, 429-445.
[HAM 50] R.W. Hamming. Error Detecting and Correcting Codes. Bell Syst.
Tech. J. 29(1950), 147-160.
[HAM 87] R.W. Hamming. Information und Codierung. Weinheim: VCH
Verlagsgesellschaft, 1987.
[HAR 28] R.V.L. Hartley. Transmission of Information. Bell Syst. Tech. J.
7(1928), 535-563.
[HEQ 95] Heise, W.; Quattrocchi, P.: Informations- und Codierungstheo-
rie. 3. Auflage. Berlin, Heidelberg, New York: Springer-Verlag, 1995.
[HOE 97] P. Hoeher. New Iterative („Turbo“) Decoding Algorithms. Proc. of
Int. Symp. on Turbo Codes, Brest, France, 1997, 63-70.
[HÖH 75] E. Hölzler, H. Holzwarth. Pulstechnik. Berlin, Heidelberg, New
York: Springer-Verlag, 1975.
[KAD 91] F. Kaderali. Digitale Kommunikationstechnik I. Netze-Dienste-
Informationstheorie-Codierung.
Braunschweig,
Wiesbaden:
Vie-
weg-Verlag, 1991.
[KÄM 71] W. Kämmerer.
Einführung
in
mathematische
Methoden
der
Kybernetik. Berlin: Akademie Verlag, 1971.
[LEZ 77]
A. Lempel, J. Ziv. A Universal Algorithm for Sequential Data
Compression. IEEE Trans. on Inform. Theory, 23(1977)3.
[MKN 96] D.J.C. MacKay, R.M. Neal. Near Shannon Limit Performance
of Low Density Parity Check Codes. Electronics Letters 12.07.1996.
Search WWH ::




Custom Search