CODES WHICH DETECT DECEPTION

被引:213
作者
GILBERT, EN [1 ]
MACWILLIAMS, FJ [1 ]
SLOANE, NJA [1 ]
机构
[1] BELL TEL LABS INC, MURRAY HILL, NJ 07974 USA
来源
BELL SYSTEM TECHNICAL JOURNAL | 1974年 / 53卷 / 03期
关键词
D O I
10.1002/j.1538-7305.1974.tb02751.x
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:405 / 424
页数:20
相关论文
共 15 条
[1]  
ALANEN J.D., 1964, Sankhya, Series A, V26, P305
[2]   COMPUTATION WITH FINITE FIELDS [J].
BARTEE, TC ;
SCHNEIDER, DI .
INFORMATION AND CONTROL, 1963, 6 (02) :79-+
[3]  
Berlekamp E. R., 1968, ALGEBRAIC CODING THE
[4]  
Carmichael R.D., 1956, INTRO THEORY GROUPS
[5]   2-ARMED-BANDIT PROBLEM WITH TIME-INVARIANT FINITE MEMORY [J].
COVER, TM ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1970, 16 (02) :185-+
[6]  
Dubins LesterE., 1965, Inequalities for Stochastic Processes (How to Gamble if You Must)
[7]  
Feller W., 1957, INTRO PROBABILITY TH, V1
[8]   RUN-LENGTH ENCODINGS [J].
GOLOMB, SW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1966, 12 (03) :399-+
[9]  
Hall M., 1967, COMBINATORIAL THEORY
[10]   A NEW INTERPRETATION OF INFORMATION RATE [J].
KELLY, JL .
BELL SYSTEM TECHNICAL JOURNAL, 1956, 35 (04) :917-926