Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,795 papers from all fields of science
Search
Sign In
Create Free Account
Code (cryptography)
Known as:
Two-part code
, Code (disambiguation)
, Codetext
Expand
In cryptology, a code is a method used to encrypt a message that operates at the level of meaning; that is, words or phrases are converted into…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
B-Dienst
Cipher
Cipher Department of the High Command of the Wehrmacht
Ciphertext
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Codes With Local Regeneration and Erasure Correction
G. Kamath
,
N. Prakash
,
V. Lalitha
,
P. V. Kumar
IEEE Transactions on Information Theory
2014
Corpus ID: 4799706
Regenerating codes and codes with locality are two coding schemes that have recently been proposed, which in addition to ensuring…
Expand
Highly Cited
2012
Highly Cited
2012
Attribute Discovery via Predictable Discriminative Binary Codes
Mohammad Rastegari
,
Ali Farhadi
,
D. Forsyth
European Conference on Computer Vision
2012
Corpus ID: 15382600
We present images with binary codes in a way that balances discrimination and learnability of the codes. In our method, each…
Expand
Highly Cited
2011
Highly Cited
2011
Principles of soft computing
S. Sivanandam
,
S. Deepa
2011
Corpus ID: 196097627
The CD contains the following content. 1. Power point presentations * Presentations are given for Chapters 1–17, 19. * MATLAB…
Expand
Highly Cited
2009
Highly Cited
2009
Explicit construction of optimal exact regenerating codes for distributed storage
K. V. Rashmi
,
Nihar B. Shah
,
P. Vijay Kumar
,
K. Ramchandran
Allerton Conference on Communication, Control…
2009
Corpus ID: 6393201
Erasure coding techniques are used to increase the reliability of distributed storage systems while minimizing storage overhead…
Expand
Highly Cited
2001
Highly Cited
2001
Combinatorial properties of frameproof and traceability codes
J. Staddon
,
Douglas R Stinson
,
R. Wei
IEEE Transactions on Information Theory
2001
Corpus ID: 9371647
In order to protect copyrighted material, codes may be embedded in the content or codes may be associated with the keys used to…
Expand
Review
2000
Review
2000
Review of James G. March, Martin Schulz, and Xueguang Zhou, The Dynamics of Rules: Change in Written Organizational Codes
F. Dobbin
2000
Corpus ID: 143008694
This is a unique book. March, Schulz, and Zhou have developed an entirely new field of organizational research, which amounts to…
Expand
Highly Cited
1997
Highly Cited
1997
Quaternary Codes
Z. Wan
,
C. Wan
1997
Corpus ID: 86531081
From the Publisher: In recent years quaternary codes have attracted the attention of the coding community as several notorious…
Expand
Review
1986
Review
1986
Digital logic testing and simulation
A. Miczo
1986
Corpus ID: 57939555
Highly Cited
1978
Highly Cited
1978
Multiphase Complementary Codes
R. Sivaswamy
IEEE Transactions on Information Theory
1978
Corpus ID: 28468099
A new class of complementary codes, similar to the complementary series of Golay but having multiphase elements, have been found…
Expand
Review
1973
Review
1973
Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and Weldon, E. J., Jr.; 1972)
J. Massey
IEEE Transactions on Information Theory
1973
Corpus ID: 33493848
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE