Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,008,042 papers from all fields of science
Search
Sign In
Create Free Account
Code (cryptography)
Known as:
Two-part code
, Code (disambiguation)
, Codetext
Expand
In cryptology, a code is a method used to encrypt a message that operates at the level of meaning; that is, words or phrases are converted into…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
B-Dienst
Cipher
Cipher Department of the High Command of the Wehrmacht
Ciphertext
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes
Hoang T. Nguyen
,
Le-Nam Tran
,
E. Hong
IEEE Communications Letters
2011
Corpus ID: 29645929
This paper investigates the benefits of applying fountain codes (FCs) in improving the transmission efficiency in broadcasting…
Expand
Highly Cited
2009
Highly Cited
2009
Exact Regeneration Codes for Distributed Storage Repair Using Interference Alignment
Changho Suh
,
K. Ramchandran
arXiv.org
2009
Corpus ID: 15338783
The high repair cost of (n,k) Maximum Distance Separable (MDS) erasure codes has recently motivated a new class of codes, called…
Expand
Highly Cited
2009
Highly Cited
2009
Exact Regenerating Codes for Distributed Storage
K. V. Rashmi
,
Nihar B. Shah
,
P. V. Kumar
,
K. Ramchandran
arXiv.org
2009
Corpus ID: 15317749
Erasure coding techniques are used to increase the reliability of distributed storage systems while minimizing storage overhead…
Expand
Highly Cited
2008
Highly Cited
2008
Constant-Rank Codes and Their Connection to Constant-Dimension Codes
M. Gadouleau
,
Zhiyuan Yan
IEEE Transactions on Information Theory
2008
Corpus ID: 9760428
Constant-dimension codes have recently received attention due to their significance to error control in noncoherent random linear…
Expand
Highly Cited
2006
Highly Cited
2006
GEN03-6: Investigation of Error Floors of Structured Low-Density Parity-Check Codes by Hardware Emulation
Zhengya Zhang
,
L. Dolecek
,
B. Nikolić
,
V. Anantharam
,
M. Wainwright
IEEE Globecom
2006
Corpus ID: 292976
Several high performance LDPC codes have parity-check matrices composed of permutation submatrices. We design a parallel-serial…
Expand
Highly Cited
2005
Highly Cited
2005
Construction of low-density parity-check codes by superposition
Jun Xu
,
Lei Chen
,
L. Zeng
,
L. Lan
,
Shu Lin
IEEE Transactions on Communications
2005
Corpus ID: 22828362
This paper presents a superposition method for constructing low-density parity-check (LDPC) codes. Several classes of structured…
Expand
Review
1999
Review
1999
Early -Blocker Therapy for Acute Myocardial Infarction in Elderly Patients
H. Krumholz
,
M. Radford
,
Yun Wang
,
Jersey Chen
,
T. Marciniak
Annals of Internal Medicine
1999
Corpus ID: 53087711
Therapy with -blockers is an effective and inexpensive early treatment for acute myocardial infarction. Several trials, including…
Expand
Highly Cited
1996
Highly Cited
1996
ITERATIVE DECODING OF TURBO CODES AND OTHER CONCATENATED CODES
S. A. Barbulescu
1996
Corpus ID: 16452213
Highly Cited
1984
Highly Cited
1984
Rotationally Invariant Convolutional Channel Coding with Expanded Signal Space-Part I: 180°
Lee-Fang Wei
IEEE J. Sel. Areas Commun.
1984
Corpus ID: 9324900
Convolutional channel coding with expanded signal space improves error performance of synchronous data links without sacrificing…
Expand
Highly Cited
1971
Highly Cited
1971
Language Codes and Memory Codes.
A. Liberman
1971
Corpus ID: 149065093
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE