Error detection and correction

Results: 1767



#Item
941Data transmission / Symbol rate / Code / MusicXML / Error detection and correction / Clef / Slur / Bond duration / Staff / Music / Musical notation / Notation

VARIATIONS2 GUIDELINES FOR ENCODED SCORE QUALITY Donald Byrd School of Music, Indiana University rev. 12 May 2004 These guidelines are influenced by a 1988 article by David Huron, “Error Categories, Detection, and Redu

Add to Reading List

Source URL: variations2.indiana.edu

Language: English - Date: 2007-06-28 14:17:01
942Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
943Hash function / MD5 / Collision resistance / SHA-1 / MD4 / RadioGatún / Block cipher / SHA-2 / Collision / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]RFadioGatun, a belt-and-mill hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:22:30
944Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
945Error detection and correction / Parity / Parity bit / RAID / Numbers / Control character / Symbol rate / ASCII / Information / Data transmission / Binary arithmetic / Telecommunications engineering

GOES Data Collection Platform Radio Set (DCPRS) CERTIFICATION STANDARDS at 300 bps and 1200 bps Version 2.0 NOAA / NESDIS

Add to Reading List

Source URL: www.noaasis.noaa.gov

Language: English - Date: 2009-09-30 08:42:12
946SHA-2 / MD5 / Error detection and correction / Cryptographic hash functions / SHA-1

Cryptographic Hash Workshop[removed]Message Modification, Neutral Bits and Boomerangs: From Which Round Should we Start Counting in SHA?"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:22:30
947Fault-tolerant computer systems / Error detection and correction / Distributed data storage / Network coding / Wireless sensor network / Erasure code / Peer-to-peer / Routing / Information theory / Coding theory / Computing / Information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 9, SEPTEMBER[removed]Network Coding for Distributed Storage Systems Alexandros G. Dimakis, Member, IEEE, P. Brighten Godfrey, Student Member, IEEE, Yunnan Wu, Memb

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2010-08-17 20:00:59
948Hashing / Search algorithms / Collision attack / Hash function / SHA-1 / Merkle–Damgård construction / MD4 / Steganography / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Using Steganography to Improve Hash Functions’ Collision Resistance Emmanouel Kellinis1 and Konstantinos Papapanagiotou2 1 KPMG LLP, One Canada Square, London E14 5AG, United Kingdom [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:05:58
949Cryptographic hash functions / Internet / Cryptographic protocols / Hashing / Error detection and correction / Steven M. Bellovin / Domain Name System Security Extensions / SHA-1 / MD5 / Cryptography / Computing / Internet protocols

Cryptographic Hash Workshop[removed]Deploying New Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:02:34
950Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
UPDATE