Adi Shamir A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:699-704 [Journal]
Morton Kanefsky, Chung-Bin Fong Predictive source coding techniques using maximum likelihood prediction for compression of digitized images. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:722-727 [Journal]
Georg Lindgren Shape and duration of clicks in modulated FM transmission. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:728-735 [Journal]
Rangasami L. Kashyap Characterization and estimation of two-dimensional ARMA models. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:736-744 [Journal]
P. Sen On noiseless source coding with specified encoder output symbol frequencies. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:752-0 [Journal]
K. Deimer Some new bounds for the maximum length of circuit codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:754-0 [Journal]
Ashok K. Gupta A note on the variance of polarity-coincidence correlation with an arbitrary covariance matrix. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:756-0 [Journal]
David M. Mandelbaum An approach to an arithmetic analog of Berlekamp's algorithm. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:758-0 [Journal]
G. Tenengolts Nonbinary codes, correcting single deletion or insertion. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:766-0 [Journal]
Kevin T. Phelps A product construction for perfect codes over arbitrary alphabets. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:769-0 [Journal]
Torleiv Kløve Generalizations of the Korzhik bound. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:771-0 [Journal]
S. L. Ma A note on binary arrays with a certain window property. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:774-0 [Journal]
Thomas Siegenthaler Correlation-immunity of nonlinear combining functions for cryptographic applications. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:776-0 [Journal]
James E. Mazo Review of 'Digital Communications' (Proakis, J.G.; 1983). [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:780-0 [Journal]
Shimon Even, Oded Goldreich Correction to 'DES-like functions can generate the alternating group' (Nov 83 863-865). [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1984, v:30, n:5, pp:780-0 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP