305 | -- | 309 | Jacobus H. van Lint, T. A. Springer. Generalized Reed - Solomon codes from algebraic geometry |
310 | -- | 314 | Rudolf Ahlswede, Amiram H. Kaspi. Optimal coding strategies for certain permuting channels |
315 | -- | 322 | Baruch Awerbuch, Robert G. Gallager. A new distributed algorithm to find breadth first search trees |
323 | -- | 328 | Ronald L. Rivest. Network control by Bayesian broadcast |
329 | -- | 340 | Loren P. Clare, Izhak Rubin. Performance boundaries for prioritized multiplexing systems |
341 | -- | 349 | Micha Hofri, Zvi Rosberg. Packet delay under the golden ratio weighted TDM policy in a multiple-access channel |
350 | -- | 359 | Neil L. Gerr, Stamatis Cambanis. Analysis of adaptive differential PCM of a stationary Gauss - Markov input |
360 | -- | 366 | Dale H. Mugler, Wolfgang Splettstösser. Linear prediction from samples of a function and its derivatives |
367 | -- | 372 | Wolfgang Härdle, Rainer Nixdorf. Nonparametric sequential estimation of zeros and extrema of regression functions |
373 | -- | 382 | Nelson M. Blachman, Robert Machol. Confidence intervals based on one or more observations |
383 | -- | 392 | Soura Dasgupta, Yih-Fang Huang. Asymptotically convergent modified recursive least-squares with data-dependent updating and forgetting factor for systems with bounded noise |
393 | -- | 407 | Jitendra K. Tugnait. Identification of linear stochastic systems via second- and fourth-order cumulant matching |
408 | -- | 0 | Wlodzimierz Greblicki, Miroslaw Pawlak. Necessary and sufficient conditions for Bayes risk consistency of a recursive kernel classification rule |
412 | -- | 0 | Philippe Delsarte, Yves V. Genin, Y. Kamp. Stability of linear predictors and numerical range of a linear operator |
415 | -- | 0 | John S. Sadowsky. On the robust discrimination of Poisson random counting measures |
419 | -- | 0 | Attilio J. Rainal. First and second passage times of Rayleigh processes |
426 | -- | 0 | Ian F. Blake, H. Darabian. Approximations for the probability in the tails of the binomial distribution |
428 | -- | 0 | Jean-Louis Dornstetter. On the equivalence between Berlekamp s and Euclid s algorithms |
432 | -- | 0 | Michiel H. M. Smid. Duadic codes |
434 | -- | 0 | Jacobus H. Weber, Cornelis de Vroedt, Dick E. Boekee. New upper bounds on the size of codes correcting asymmetric errors |
438 | -- | 0 | Jan L. P. de Lameillieure. A heuristic algorithm for the construction of a code with limited word length |
443 | -- | 0 | Katalin Marton. Sequences achieving the boundary of the entropy region for a two-source are virtually memoryless |
448 | -- | 0 | Kenneth J. Kerpez. The rate-distortion function of a binary symmetric source when side information may be absent |
452 | -- | 0 | Kees A. Schouhamer Immink, G. F. M. Beenker. Binary transmission codes with higher order spectral zeros at zero frequency |
454 | -- | 0 | Michael E. Monaco, James M. Lawler. Corrections and additions to Error recovery for variable length codes by J.C. Maxted and J.P. Robinson |