Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,253,147 papers from all fields of science
Search
Sign In
Create Free Account
Identifier
Known as:
Identifier (computer programming)
, Name and identifier
, Identifier (metadata)
Expand
An identifier is a name that identifies (that is, labels the identity of) either a unique object or a unique class of objects, where the "object" or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ALGOL 68
Broadcast range
CODEN
Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Platoon management with cooperative adaptive cruise control enabled by VANET
M. Amoozadeh
,
Hui Deng
,
Chen-Nee Chuah
,
H. Michael Zhang
,
D. Ghosal
Vehicular Communications
2015
Corpus ID: 869892
Highly Cited
2013
Highly Cited
2013
Titanium and Titanium Alloys
R. Wegman
,
J. Twisk
2013
Corpus ID: 102401430
Highly Cited
2013
Highly Cited
2013
A Novel Event-Triggered Transmission Scheme and ${\cal L}_{2}$ Control Co-Design for Sampled-Data Control Systems
Chen Peng
,
Q. Han
IEEE Transactions on Automatic Control
2013
Corpus ID: 10861306
This note is concerned with the event-triggered L2 control for a sampled-data control system. A novel event-triggered…
Expand
Highly Cited
2009
Highly Cited
2009
Quasicyclic low-density parity-check codes from circulant permutation matrices
M. Hagiwara
,
M. Fossorier
IEEE Transactions on Information Theory
2009
Corpus ID: 9319418
In this correspondence, the construction of low-density parity-check (LDPC) codes from circulant permutation matrices is…
Expand
Highly Cited
2007
Highly Cited
2007
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
R. Wilson
,
David Tse
,
R. Scholtz
IEEE Transactions on Information Forensics and…
2007
Corpus ID: 14159981
To establish a secure communications link between any two transceivers, the communicating parties require some shared secret, or…
Expand
Highly Cited
2007
Highly Cited
2007
Rateless Codes With Unequal Error Protection Property
Nazanin Rahnavard
,
Badri N. Vellambi
,
F. Fekri
IEEE Transactions on Information Theory
2007
Corpus ID: 102682
In this correspondence, a generalization of rateless codes is proposed. The proposed codes provide unequal error protection (UEP…
Expand
Highly Cited
2002
Highly Cited
2002
Protecting Free Expression Online with Freenet
I. Clarke
,
S. Miller
,
Theodore W. Hong
,
Oskar Sandberg
,
Brandon Wiley
IEEE Internet Computing
2002
Corpus ID: 28649940
Freenet is a distributed information storage system designed to address information privacy and survivability concerns. Freenet…
Expand
Highly Cited
2000
Highly Cited
2000
Adaptive modulation techniques for duplex OFDM transmission
T. Keller
,
L. Hanzo
IEEE Transactions on Vehicular Technology
2000
Corpus ID: 15678829
The design tradeoffs of turbo-coded burst-by-burst adaptive orthogonal frequency division multiplex (OFDM) wideband transceivers…
Expand
Highly Cited
1983
Highly Cited
1983
The Dynamics of Party Identification
C. Franklin
,
John E. Jackson
American Political Science Review
1983
Corpus ID: 143735916
This article presents a model of individuals' party identification that contrasts with previous models. Past models, with the few…
Expand
Highly Cited
1977
Highly Cited
1977
Testing Programs with the Aid of a Compiler
R. Hamlet
IEEE Transactions on Software Engineering
1977
Corpus ID: 15276725
if finite input-output specifications are added to the syntax of programs, these specifications can be verified at compile time…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE