Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,231,737 papers from all fields of science
Search
Sign In
Create Free Account
ANSI art
Known as:
ANSI graphic
, ANSI (disambiguation)
, ANSI Scene
Expand
ANSI art is a computer art form that was widely used at one time on BBSes. It is similar to ASCII art, but constructed from a larger set of 256…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
27 relations
.nfo
ANSI escape code
ASCII art
Code page 437
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Insertion attack effects on standard PRNGs ANSI X9.17 and ANSI X9.31 based on statistical distance tests and entropy difference tests
Kuni Inayah
,
Rahmat Purwoko
,
Bondan Estuwira Sukmono
,
S. Indarjani
International Conference on Computer, Control…
2013
Corpus ID: 17122274
Insertion attack is one form of active attack against a random number generator, that aimed to undermine even frustrate the…
Expand
2011
2011
ANSI C12.22, IEEE 1703, and MC12.22 Transport Over IP
A. Moise
,
Jonathan Brodkin
RFC
2011
Corpus ID: 10175285
This RFC provides a framework for transporting ANSI C12.22/IEEE 1703/ MC1222 Advanced Metering Infrastructure (AMI) Application…
Expand
Highly Cited
2008
Highly Cited
2008
Hybrid differentiation strategies for simulation and analysis of applications in C++
R. Bartlett
,
B. V. B. Waanders
,
M. Berggren
TOMS
2008
Corpus ID: 14257747
Computationally efficient and accurate derivatives are important to the success of many different types of numerical methods…
Expand
2008
2008
A Session Key Generator Based on Chaotic Sequence
Chen Zhuo
,
Zhang Zhengwen
,
Jiang Nan
International Conference on Computer Science and…
2008
Corpus ID: 15175537
Key management is a very important part in cryptography. It is related to generation, exchange, storage, safeguarding, use, and…
Expand
2006
2006
A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application
K. Takashima
IEICE Trans. Fundam. Electron. Commun. Comput…
2006
Corpus ID: 2922841
The Gallant-Lambert-Vanstone method [14] (GLV method for short) is a scalar multiplication method for elliptic curve cryptography…
Expand
2000
2000
Users' Hazard Perceptions of Warning Components: An Examination of Colors and Symbols
T. Smith-Jackson
,
M. Wogalter
2000
Corpus ID: 37252152
This study examined color and symbol hazard ratings among participants whose primary language was English and who were…
Expand
1991
1991
FDDI Data Link Development
Henry S. Yang
,
B. Spinney
,
Stephen Towning
Digit. Tech. J.
1991
Corpus ID: 2948195
The fiber distributed data interface (FDDI) data link is based on the ANSI X3T9.5 FDDI standards with Digital’s enhancements to…
Expand
1985
1985
Magnitude, Amplitudes and Frequencies of Induction-Motor Air-Gap Transient Torque Through Simultaneous Reclosing with or Without Capacitors
J. Htsui
IEEE Transactions on Power Apparatus and Systems
1985
Corpus ID: 35931928
Knowing the magnitude, the frequencies and the amplitudes of the air-gap transient torque will definitely help the engineer to…
Expand
Highly Cited
1981
Highly Cited
1981
Induction Motor Efficiency Test Methods
P. G. Cummings
,
W. D. Bowers
,
W. Martiny
IEEE Transactions on Industry Applications
1981
Corpus ID: 16448581
Electric motor drives are significant to the overall energy requirements of the country and the world. The majority of these…
Expand
Review
1979
Review
1979
Current Transformer Burden and Saturation
L. Powell
IEEE Transactions on Industry Applications
1979
Corpus ID: 982073
A tutorial review of the steady-state and transient behavior of current transformers used with power system relays and meters is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE