Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,160,653 papers from all fields of science
Search
Sign In
Create Free Account
Code
Known as:
Encodings
, Codes
, Encode/Decode
Expand
In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Bag tag
Browser sniffing
C-QUAM
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Remittances, Migrants' Education and Immigration Policy: Theory and Evidence from Bilateral Data
F. Docquier
,
Hillel Rapoport
,
S. Salomone
Social Science Research Network
2012
Corpus ID: 12406877
Highly Cited
2010
Highly Cited
2010
Semi-supervised hashing for scalable image retrieval
Jun Wang
,
O. Kumar
,
Shih-Fu Chang
IEEE Computer Society Conference on Computer…
2010
Corpus ID: 5817453
Large scale image search has recently attracted considerable attention due to easy availability of huge amounts of data. Several…
Expand
Review
2005
Review
2005
The EGS5 code system
H. Hirayama
,
Y. Namito
,
Oho Tsukuba-shi Ibaraki-ken
,
A. Bielajew
,
S. Wilderman
2005
Corpus ID: 60685471
In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical…
Expand
Highly Cited
2005
Highly Cited
2005
Chapter 41 – Advances in electronic structure theory: GAMESS a decade later
M. Gordon
,
Michael W. Schmidt
2005
Corpus ID: 51850388
Review
2003
Review
2003
Modelling air quality in street canyons : a review
S. Vardoulakis
,
B. Fisher
,
K. Pericleous
,
N. Gonzalez-Flesca
2003
Corpus ID: 55939985
Highly Cited
2001
Highly Cited
2001
ERROR FEEDBACK IN L2 WRITING CLASSES: HOW EXPLICIT DOES IT NEED TO BE?
D. Ferris
,
Barrie Roberts
2001
Corpus ID: 58784180
Highly Cited
2001
Highly Cited
2001
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
Marc Langheinrich
Ubiquitous Computing
2001
Corpus ID: 1069784
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six…
Expand
Review
1997
Review
1997
Space-time processing for wireless communications
A. Paulraj
IEEE International Conference on Acoustics…
1997
Corpus ID: 6814634
This paper reviews space-time signal processing in mobile wireless communications. Space-time processing refers to the signal…
Expand
Review
1995
Review
1995
Introduction to Adaptive Methods for Differential Equations
K. Eriksson
,
D. Estep
,
P. Hansbo
,
Claes Johnson
Acta Numerica
1995
Corpus ID: 122769521
Knowing thus the Algorithm of this calculus, which I call Differential Calculus, all differential equations can be solved by a…
Expand
Review
1994
Review
1994
Market attractiveness, resource-based capabilities, venture strategies, and venture performance
Gaylen N. Chandler
,
S. Hanks
1994
Corpus ID: 167551378
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE