Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,157,516 papers from all fields of science
Search
Sign In
Create Free Account
Character encoding
Known as:
Coded character
, Character coding
, Coded Character Set
Expand
In computing, a character encoding is used to represent a repertoire of characters by some kind of an encoding system. Depending on the abstraction…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASCII art
Adobe Atmosphere Community Server
Armenian alphabet
Backward compatibility
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Dual System Encryption via Predicate Encodings
H. Wee
Theory of Cryptography Conference
2014
Corpus ID: 17254948
We introduce the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in…
Expand
Highly Cited
2011
Highly Cited
2011
Humanities Approaches to Graphical Display
J. Drucker
Digital Humanities Quarterly
2011
Corpus ID: 12676567
As digital humanists have adopted visualization tools in their work, they have borrowed methods developed for the graphical…
Expand
Highly Cited
2006
Highly Cited
2006
Extracting Motion Primitives from Natural Handwriting Data
Ben H. Williams
,
Marc Toussaint
,
A. Storkey
International Conference on Artificial Neural…
2006
Corpus ID: 561023
For the past 10 years it has become clear that biological movement is made up of sub-routine type blocks, or motor primitives…
Expand
Highly Cited
2003
Highly Cited
2003
Feature selection for support vector machines by means of genetic algorithm
Holger Fröhlich
,
O. Chapelle
,
B. Scholkopf
Proceedings. 15th IEEE International Conference…
2003
Corpus ID: 12179782
The problem of feature selection is a difficult combinatorial task in machine learning and of high practical relevance, e.g. in…
Expand
Highly Cited
1999
Highly Cited
1999
Copyright protection for the electronic distribution of text documents
Jack Brassil
,
S. Low
,
N. Maxemchuk
Proceedings of the IEEE
1999
Corpus ID: 15887638
Each copy of a text document can be made different in a nearly invisible way by repositioning or modifying the appearance of…
Expand
Highly Cited
1999
Highly Cited
1999
The Network Access Identifier
B. Aboba
,
Mark A. Beadles
,
J. Arkko
,
P. Eronen
Request for Comments
1999
Corpus ID: 26968279
In order to enhance the interoperability of roaming and tunneling services, it is desirable to have a standardized method for…
Expand
Highly Cited
1998
Highly Cited
1998
On the Properties of Bit String-Based Measures of Chemical Similarity
D. Flower
Journal of chemical information and computer…
1998
Corpus ID: 15353316
With the growth of interest in database searching and compound selection, the quantification of chemical similarity has become an…
Expand
Highly Cited
1996
Highly Cited
1996
Social psychological models of interpersonal communication
R. Krauss
,
Susan R. Fussell
1996
Corpus ID: 142433323
states or predispositions. Any particular behavioral episode can be characterized in a variety of ways at different levels of…
Expand
Highly Cited
1996
Highly Cited
1996
Implementing SAP R/3
Nancy H. Bancroft
,
F. Cunningham
1996
Corpus ID: 109809527
From the Publisher: This book deals with technical, business, and change management issues of implementing SAP's R/3. The author…
Expand
Highly Cited
1974
Highly Cited
1974
Hadamard Matrices, Baumert-Hall Units, Four-Symbol Sequences, Pulse Compression, and Surface Wave Encodings
R. Turyn
Journal of combinatorial theory. Series A
1974
Corpus ID: 14801586
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE