Estimating the complexity of implementation for a coding/decoding system is a delicate question. There is usually no unique answer. We can make a rought distinction between : - algorithmic complexity ; — hardware complexity, corresponding to the number of logical gates and binary memories contained in a codin g or decoding device. For the first notion in the case of block codes, one deals mostly with arithmetic complexity . We survey the mai n existing estimations "practical" and asymptotical while trying to distinguish between the operations in an extensio n field and those on the ground field. We illustrate the second notion with an example showing the limitations o f some evaluations .Apprécier la complexité de la mise en oeuvre ...
Determining whether or not a Constraint Satisfaction Problem (CSP) has a solution is NP-complete. C...
This manuscript is a synthesis of our research e ort since one full decade on the topic of low level...
In this document a new secret key cryptosystem is presented . It uses a set of particular error corr...
A modified version of the stack algorithm of sequential decoding is presented for the decoding of hi...
Cette thèse s’intéresse à la question de démontrer rigoureusement que l’implantation d’un algorithme...
Over the last 15 years, spectacular advances in the analysis and design of graph-basedcodes and iter...
Au cours des 15 dernières années, des progrès spectaculaires dans l'analyse et la conception des cod...
The most significant drawback in using neighbourhood processing (linear filtering, morphology) is th...
Ordinary dialogical logic offers processing memory as a history of dialogues. Find a reference (just...
Cet article propose une étude comparée entre algorithme et architecture en vue de l'implantation sur...
This thesis deals with algebraic geometric (AG) codes and theirdecoding. Those codes are composed of...
We present an information-based complexity problem for which the computational complexity can be any...
The increase in the complexity of signal processing and image algorithms, under the execution time c...
Telecommunication applications require transmitting data with different format such as sound, video,...
A model checker can produce a trace of counter-example for erroneous program, which is often difficu...
Determining whether or not a Constraint Satisfaction Problem (CSP) has a solution is NP-complete. C...
This manuscript is a synthesis of our research e ort since one full decade on the topic of low level...
In this document a new secret key cryptosystem is presented . It uses a set of particular error corr...
A modified version of the stack algorithm of sequential decoding is presented for the decoding of hi...
Cette thèse s’intéresse à la question de démontrer rigoureusement que l’implantation d’un algorithme...
Over the last 15 years, spectacular advances in the analysis and design of graph-basedcodes and iter...
Au cours des 15 dernières années, des progrès spectaculaires dans l'analyse et la conception des cod...
The most significant drawback in using neighbourhood processing (linear filtering, morphology) is th...
Ordinary dialogical logic offers processing memory as a history of dialogues. Find a reference (just...
Cet article propose une étude comparée entre algorithme et architecture en vue de l'implantation sur...
This thesis deals with algebraic geometric (AG) codes and theirdecoding. Those codes are composed of...
We present an information-based complexity problem for which the computational complexity can be any...
The increase in the complexity of signal processing and image algorithms, under the execution time c...
Telecommunication applications require transmitting data with different format such as sound, video,...
A model checker can produce a trace of counter-example for erroneous program, which is often difficu...
Determining whether or not a Constraint Satisfaction Problem (CSP) has a solution is NP-complete. C...
This manuscript is a synthesis of our research e ort since one full decade on the topic of low level...
In this document a new secret key cryptosystem is presented . It uses a set of particular error corr...