Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

ANSI escape code

Known as: SCP, SGR (ANSI), ANSI JFY 
In computing, ANSI escape codes (or escape sequences) are a method using in-band signaling to control the formatting, color, and other output options… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2003
Highly Cited
2003
This paper presents the expected transmission count metric (ETX), which finds high-throughput paths on multi-hop wireless… 
Highly Cited
2003
Highly Cited
2001
Highly Cited
2001
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2001
Highly Cited
2001
We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF… 
Highly Cited
2001
Highly Cited
2001
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA… 
Highly Cited
2000
Highly Cited
2000
GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2000
Highly Cited
2000
This paper describes a database designed to evaluate the performance of speech recognition algorithms in noisy conditions. The… 
  • table 1
  • table 5
Review
1999
Review
1999
  • L. Zelles
  • Biology and Fertility of Soils
  • 1999
  • Corpus ID: 12554907
Abstract This review discusses the analysis of whole-community phospholipid fatty acid (PLFA) profiles and the composition of… 
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 2
Highly Cited
1998
Highly Cited
1998
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any… 
  • table I
  • table II
  • table III
  • table IV
  • figure 1
Highly Cited
1994
Highly Cited
1994
SummaryComputer codes for computation and comparison of RNA secondary structures, the Vienna RNA package, are presented, that are… 
  • table 3
  • figure 1
  • figure 3
  • figure 4
  • figure 5