Benny Chor, Ronald L. Rivest A knapsack-type public key cryptosystem based on arithmetic in finite fields. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:901-909 [Journal]
H. Vincent Poor Fine quantization in signal detection and estimation. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:960-972 [Journal]
Lee K. Jones A stochastic multisample extension of Morris's robust detector in bounded amplitude noise. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:973-978 [Journal]
Chein-I Chang, Lee D. Davisson On calculating the capacity of an infinite-input finite (infinite)-output channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1004-1010 [Journal]
Paul K. M. Ho, Peter J. McLane Spectrum, distance, and receiver complexity of encoded continuous phase modulation. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1021-1032 [Journal]
Ofer Zeitouni On the filtering of noise-contaminated signals observed via hard limiters. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1041-1048 [Journal]
Peter Elias Zero error capacity under list decoding. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1070-0 [Journal]
Kjell Jørgen Hole New short constraint length rate (n-1)/n punctured convolutional codes for soft-decision Viterbi decoding. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1079-0 [Journal]
James A. Bucklew A large deviation theory proof of the abstract alphabet source coding theorem. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1081-0 [Journal]
Peter Vanroose Code construction for the noiseless binary switching multiple-access channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1100-0 [Journal]
Zhen Zhang Partial converse for a relay channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1106-0 [Journal]
Toby Berger Preface to special issue on coding techniques and coding theory. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1121- [Journal]
G. David Forney Jr. Coset codes-I: Introduction and geometrical classification. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1123-1151 [Journal]
G. David Forney Jr. Coset codes-II: Binary lattices and related codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1152-1187 [Journal]
Nambirajan Seshadri, John B. Anderson Asymptotic error performance of modulation codes in the presence of severe intersymbol interference. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1203-1216 [Journal]
Göran Lindell, Carl-Erik W. Sundberg An upper bound on the bit error probability of combined convolutional coding and continuous phase modulation. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1263-0 [Journal]
Daniel Zwillinger Differential PPM has a higher throughput than PPM for the band-limited and average-power-limited optical channel (corresp.). [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1269-0 [Journal]
Jacobus H. van Lint Introduction to special section on coding theory. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1274-0 [Journal]
Patrick Stevens Extension of the BCH decoding algorithm to decode binary cyclic codes up to their maximum error correction capacities. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1332-1340 [Journal]
Michael Wirtz On the parameters of Goppa codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1341-0 [Journal]
Juriaan Simonis The minimal covering radius t[15, 6] of a six-dimensional binary linear code of length 15 is equal to 4. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1344-0 [Journal]
Akira Shiozaki Decoding of redundant residue polynomial codes using Euclid's algorithm. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1351-0 [Journal]
Jeffrey S. Leon A probabilistic algorithm for computing minimum weights of large error-correcting codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1354-0 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP