Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,368,770 papers from all fields of science
Search
Sign In
Create Free Account
Hamming distance
Known as:
Hamming cube
, Minimum Hamming distance
, Substitution distance
Expand
In information theory, the Hamming distance between two strings of equal length is the number of positions at which the corresponding symbols are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Admissible heuristic
Belief revision
Biometrics
Bitwise operation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Secure Public Verification of IP Marks in FPGA Design Through a Zero-Knowledge Protocol
Debasri Saha
,
S. Sur-Kolay
IEEE Transactions on Very Large Scale Integration…
2012
Corpus ID: 27553304
In nanometer technology regime, design components mandate their reuse to meet the complex design challenges and hence comprise…
Expand
2008
2008
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
Konrad J. Kulikowski
,
Zhen Wang
,
M. Karpovsky
Workshop on Fault Diagnosis and Tolerance in…
2008
Corpus ID: 2032296
The adaptive and active nature of fault based side-channel attacks along with the large arsenal of fault injection methods…
Expand
Highly Cited
2005
Highly Cited
2005
Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation
Carmen Sánchez Ávila
,
R. Sánchez-Reillo
Pattern Recognition
2005
Corpus ID: 31175409
2004
2004
Fuzzy hamming distance in a content-based image retrieval system
M. Ionescu
,
A. Ralescu
IEEE International Conference on Fuzzy Systems
2004
Corpus ID: 18751562
The performance of content-based image retrieval (CBIR) systems mainly depends on the image similarity measure that it uses. The…
Expand
2003
2003
On Exact and Approximation Algorithms for Distinguishing Substring Selection
J. Gramm
,
Jiong Guo
,
R. Niedermeier
International Symposium on Fundamentals of…
2003
Corpus ID: 14944633
The NP-complete Distinguishing Substring Selection problem (DSSS for short) asks, given a set of “good” strings and a set of “bad…
Expand
2002
2002
A hybrid search combining interior point methods and metaheuristics for 0–1 programming
Agnès Plateau
,
D. Tachat
,
P. Tolla
2002
Corpus ID: 113406893
Our search deals with methods hybridizing interior point processes and metaheuristics for solving 0-1 linear programs. This paper…
Expand
Highly Cited
1997
Highly Cited
1997
Approaching Shannon's capacity limit by 0.2 dB using simple Hamming codes
H. Nickl
,
J. Hagenauer
,
F. Burkert
IEEE Communications Letters
1997
Corpus ID: 6608427
The authors show that the Shannon capacity limit for the additive white Gaussian noise (AWGN) channel can be approached within 0…
Expand
1997
1997
Dynamic operand interchange for low power
Taekyoon Ahn
,
Kiyoung Choi
1997
Corpus ID: 14650262
Power consumption of an execution unit can be reduced by interchanging its two input operands. A dynamic operand interchange…
Expand
1976
1976
Concerning a bound on undetected error probability (Corresp.)
S. K. Leung-Yan-Cheong
,
M. Hellman
IEEE Transactions on Information Theory
1976
Corpus ID: 2682648
In the past, it has generally been assumed that the probability of undetected error for an (n,k) block code, used solely for…
Expand
1974
1974
Optimal Rectangular Code for High Density Magnetic Tapes
Arvind M. Patel
,
S. Hong
IBM Journal of Research and Development
1974
Corpus ID: 27087582
IBM's 6250 bpi 3420 series tape units require a powerful error-correcting code for the standard 9-track format. The optimal…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required