Abstract
A METHOD of approach is described here in connexion with international telegraph (Morse) code, but not much change is necessary with other systems of substitution ciphers1. At this stage no reference is made to a vocabulary or to the syntactic and semantic context2.
Similar content being viewed by others
Article PDF
References
Findler, N. V., Computer for Cryptanalysis. Part (b), Paper BI 3.3, Summarized Proc. First Conf. Automatic Computing and Data Processing, Australia (1960).
Evens, M. W., et al., Mass. Inst. Tech. Lincoln Lab. Rep., No. 54, G–0022 (1960).
Blair, C. B., J. Assoc. Comp. Mach., 6, 429 (1959).
Freimer, M., et al., Inst. Rad. Eng. Trans. Information Theory IT–5, 25 (1959).
Gold, B., Inst. Had. Eng. Trans, on Information Theory IT–5, 17 (1959).
Baddeley, A. D., et al., Nature, 186, 414 (1960).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
FINDLER, N. Machine Learning from Noisy Information. Nature 204, 103 (1964). https://doi.org/10.1038/204103a0
Issue Date:
DOI: https://doi.org/10.1038/204103a0
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.