Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,975,551 papers from all fields of science
Search
Sign In
Create Free Account
Letter frequency
Known as:
Frequency of letters
, Letter frequencies
, Most common letters
Expand
Linguists use letter frequency analysis as a rudimentary technique for language identification, where it's particularly effective as an indication of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bigram
Chorded keyboard
Content sniffing
Corpus linguistics
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An achievable error exponent for the multiple access channel with correlated sources
A. Rezazadeh
,
Josep Font-Segura
,
Alfonso Martinez
,
A. G. Fàbregas
International Symposium on Information Theory
2017
Corpus ID: 12044101
This paper derives an achievable random-coding error exponent for joint source-channel coding over a multiple access channel with…
Expand
Review
2017
Review
2017
Writer Identification in Modern and Historical Documents via Binary Pixel Patterns, Kolmogorov-Smirnov Test and Fisher's Method
Arie Shaus
,
Eli Turkel
Human Vision and Electronic Imaging
2017
Corpus ID: 21705222
The authors present a new method of writer identification, employing the full power of multiple experiments, which yields a…
Expand
2015
2015
A FREUDIAN PSYCHOANALYTIC ANALYSIS OF NATHANIEL HAWTHORNE'S THE SCARLET LETTER 1
N. Hawthorne
2015
Corpus ID: 55155170
Sigmund Freud the founder of modern psychiatry provides the opportunity to analyze the literary characters through the…
Expand
2014
2014
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments
W. Meng
,
Wenjuan Li
,
Lam-for Kwok
Information Security Conference
2014
Corpus ID: 756097
The signature-based intrusion detection systems are one of the most commonly used software to protect computer networks by…
Expand
2009
2009
A Fragile Watermarking Scheme Based on SVD for Web Pages
Xianzhong Long
,
Hong Peng
,
Changle Zhang
International Conference on Wireless…
2009
Corpus ID: 16756286
With the development of the Internet, more and more people concern the protection of web pages. Fragile watermarking technique is…
Expand
2008
2008
Comment on "Scattering Theory Derivation of a 3D Acoustic Cloaking Shell"
A. Greenleaf
,
Y. Kurylev
,
M. Lassas
,
G. Uhlmann
2008
Corpus ID: 118252323
In a recent Letter, Cummer et al. give a description of material parameters for acoustic wave propagation giving rise to a 3D…
Expand
2008
2008
The rate loss of single letter characterization for the “dirty” multiple access channel
T. Philosof
,
R. Zamir
IEEE Information Theory Workshop
2008
Corpus ID: 59982
For general memoryless systems, the typical information theoretic solution, when exists, has a ldquosingle-letterrdquo form. This…
Expand
2006
2006
RESUSCITATION OF HUMANITY——ANALYSIS OF THREE CHARACTERS IN HAWTHORNE'S THE SCARLET LETTER
Wang Qing-guang
2006
Corpus ID: 147722612
The signification of The Scarlet Letter has been a controversy ever since it was born.Analyzing the three main characters from…
Expand
2006
2006
Language Identification, Automatic
P. Juola
2006
Corpus ID: 59946909
1993
1993
Touch-typing with a stylus (abstract)
David Goldberg
,
Cate Richardson
INTERCHI
1993
Corpus ID: 5586849
Keyboards are a vital part of today’s computers. Although keyboards are somewhat butky, they are well suited to PCs (even…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE