Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,289,902 papers from all fields of science
Search
Sign In
Create Free Account
Binary code
Known as:
Binary code (computing)
, Binary codes
, Computer binary
Expand
A binary code represents text or computer processor instructions using the binary number system's two binary digits, 0 and 1. The binary code assigns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
A Mathematical Theory of Communication
Apple Computer, Inc. v. Franklin Computer Corp.
BCD (character encoding)
Binary file
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Supervised deep hashing with a joint deep network
Yaxiong Chen
,
Xiaoqiang Lu
,
Xuelong Li
Pattern Recognition
2020
Corpus ID: 218968169
Highly Cited
2010
Highly Cited
2010
Random Binary Code Generation Using Dark-Bright Soliton Conversion Control Within a PANDA Ring Resonator
Thanawat Phatharaworamet
,
C. Teeka
,
Rangsan Jomtarak
,
S. Mitatha
,
P. Yupapin
Journal of Lightwave Technology
2010
Corpus ID: 40161825
In this paper, we have derived and presented the dynamic behavior of dark-bright soliton collision within the modified add/drop…
Expand
Highly Cited
2009
Highly Cited
2009
Improving Generalization of Fuzzy IF--THEN Rules by Maximizing Fuzzy Entropy
Xizhao Wang
,
Chun-Ru Dong
IEEE transactions on fuzzy systems
2009
Corpus ID: 206684054
When fuzzy IF-THEN rules initially extracted from data have not a satisfying performance, we consider that the rules require…
Expand
Highly Cited
2008
Highly Cited
2008
Construction of nonbinary cyclic, quasi-cyclic and regular LDPC codes: a finite geometry approach
L. Zeng
,
L. Lan
,
Y. Tai
,
Bo Zhou
,
Shu Lin
,
K. Abdel-Ghaffar
IEEE Transactions on Communications
2008
Corpus ID: 10540664
This paper presents five methods for constructing nonbinary LDPC codes based on finite geometries. These methods result in five…
Expand
Highly Cited
2005
Highly Cited
2005
Theoretical basis for intrusion detection
Zhuowei Li
,
Amitabha Das
,
Jianying Zhou
Proceedings from the Sixth Annual IEEE SMC…
2005
Corpus ID: 8559743
Intrusion detection has become an indispensable defense line in the information security infrastructure. However, every intrusion…
Expand
Highly Cited
2005
Highly Cited
2005
LusSy: a toolbox for the analysis of systems-on-a-chip at the transactional level
M. Moy
,
F. Maraninchi
,
L. Maillet-Contoz
International Conference on Application of…
2005
Corpus ID: 2457667
We describe a toolbox for the analysis of systems-on-a-chip described in SystemC at the transactional level. The tools are able…
Expand
2001
2001
The /spl pi/-rotation low-density parity check codes
R. Echard
,
Shih-Chun Chang
GLOBECOM'01. IEEE Global Telecommunications…
2001
Corpus ID: 12279850
We introduce an ensemble of quasi-regular low-density parity check error control codes we call /spl pi/-rotation LDPC codes…
Expand
Highly Cited
2001
Highly Cited
2001
Watermarking and copyright labeling of printed images
H. Hel-Or
J. Electronic Imaging
2001
Corpus ID: 35657017
Digital watermarking is a labeling technique for digital images which embeds a code into the digital data so the data are marked…
Expand
Highly Cited
1989
Highly Cited
1989
Optical Multiplication And Division Using Modified-Signed-Digit Symbolic Substitution
K. Hwang
,
A. Louri
1989
Corpus ID: 2165290
The modified-signed-digit (MSD) number system offers parallel addition and subtraction of any two numbers, with carry propagation…
Expand
Review
1974
Review
1974
A survey ol digital picture coding
A. Habibi
,
G. S. Robinson
Computer
1974
Corpus ID: 19723837
The steady growth of modern communication requirements has resulted in a steady increase in the volume of pictorial data that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE