Cryptography Reference
In-Depth Information
[HAG 88] J. Hagenauer.
Rate-Compatible Punctured Convolutional Codes
(RCPC Codes) and their Applications.
IEEE Trans. on Com.,
1988, 389-400.
[HAH 89] J. Hagenauer, P. Hoeher.
A Viterbi Algorithm with Soft-Decision
Outputs and its Applications.
IEEE, Globecom 1989, 1680-1686.
[HAG 94] J. Hagenauer.
Soft is better than hard.
In: R.E. Blahut, D.J.
Costello, U. Maurer, T. Mittelholzer (Hrsg.): Communications and
Cryptography - Two Sides of One Tapestry, 1994, 155-171.
[HAO 96] J. Hagenauer, E. Offer, L. Papke.
Iterative Decoding of Binary
Block and Convolutional Codes.
IEEE Trans. on Inform. Theory,
1996, 429-445.
[HAM 50] R.W. Hamming.
Error Detecting and Correcting Codes.
Bell Syst.
Tech. J. 29(1950), 147-160.
[HAM 87] R.W. Hamming.
Information und Codierung.
Weinheim: VCH
Verlagsgesellschaft, 1987.
[HAR 28] R.V.L. Hartley.
Transmission of Information.
Bell Syst. Tech. J.
7(1928), 535-563.
[HEQ 95] Heise, W.; Quattrocchi, P.:
Informations- und Codierungstheo-
rie.
3. Auflage. Berlin, Heidelberg, New York: Springer-Verlag, 1995.
[HOE 97] P. Hoeher.
New Iterative („Turbo“) Decoding Algorithms.
Proc. of
Int. Symp. on Turbo Codes, Brest, France, 1997, 63-70.
[HÖH 75] E. Hölzler, H. Holzwarth.
Pulstechnik.
Berlin, Heidelberg, New
York: Springer-Verlag, 1975.
[KAD 91] F. Kaderali.
Digitale Kommunikationstechnik I. Netze-Dienste-
Informationstheorie-Codierung.
Braunschweig,
Wiesbaden:
Vie-
weg-Verlag, 1991.
[KÄM 71] W. Kämmerer.
Einführung
in
mathematische
Methoden
der
Kybernetik.
Berlin: Akademie Verlag, 1971.
[LEZ 77]
A. Lempel, J. Ziv.
A Universal Algorithm for Sequential Data
Compression.
IEEE Trans. on Inform. Theory, 23(1977)3.
[MKN 96] D.J.C. MacKay, R.M. Neal.
Near Shannon Limit Performance
of Low Density Parity Check Codes.
Electronics Letters 12.07.1996.