共 50 条
- [1] Method of fountain code based privacy protection and data recovery Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 54 - 57
- [3] A method of vehicle networking environment information sharing based on distributed fountain code International Journal of Intelligent Networks, 2024, 5 : 19 - 29
- [4] Digital fountain base on LDPC code Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2008, 30 (04): : 822 - 825
- [5] A distributed fountain code for cooperative communications Zhu, Kai-Yan, 1600, Chinese Institute of Electronics (42):
- [6] Study on the Method for Removing Boundary Burr Based on Relevance of Chain Code ADVANCED RESEARCH ON ELECTRONIC COMMERCE, WEB APPLICATION, AND COMMUNICATION, PT 2, 2011, 144 : 188 - +
- [9] The Application of Fountain Code in Satellite Navigation System CHINA SATELLITE NAVIGATION CONFERENCE (CSNC) 2016 PROCEEDINGS, VOL II, 2016, 389 : 3 - 13
- [10] Removing clones from the code JOURNAL OF SOFTWARE MAINTENANCE-RESEARCH AND PRACTICE, 1999, 11 (04): : 223 - 243