Author of the publication

Soft Decision Decoding of Reed Solomon Codes Using the Dorsch Algorithm.

, and . IMACC, volume 1025 of Lecture Notes in Computer Science, page 94-99. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment., , , and . EGCDMAS, page 82-90. INSTICC Press, (2004)Watermarking and Secure Distribution for Encrypted Video., , and . Communications and Multimedia Security, volume 152 of IFIP Conference Proceedings, page 131-142. Kluwer, (1999)Performance of bandwidth efficient multilevel HARQ schemes over wireless channels., and . PIMRC, page 2596-2600. IEEE, (2004)An Encoding Scheme for Dual Level Access to Broadcasting Networks., , and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 114-118. Springer, (1999)Primal Fusion Thought Networking., , and . ICSC, page 561-562. IEEE Computer Society, (2009)Definition of Protocols for Secure Anonymous Purchase., , , , and . ICAS/ICNS, page 34. IEEE Computer Society, (2005)Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes., , and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 290-299. Springer, (1999)Applying spread spectrum technique for transmitting extra bits over AWGN channel., and . ICON, page 390-395. IEEE, (2001)Maintaining Solutions to Changing Interdependent Equations, , , , and . Technical Report, CS-88-13. Department of Comp. Sc., Brown University, Providence, RI, (November 1988)Incremental Evaluation of Attributed Graphs, , , , and . research report RC, 13205. IBM T.J. Watson Research Center, Yorktown Heights, NY, (October 1987)