Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,273,713 papers from all fields of science
Search
Sign In
Create Free Account
Base64
Known as:
Radix64
, Modified Base64
, Radix-64
Expand
Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
8-bit clean
ASP.NET
Acid2
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Text encoding for deep learning neural networks: A reversible base 64 (Tetrasexagesimal) Integer Transformation (RIT64) alternative to one hot encoding with applications to Arabic morphology
Mohammed A El Affendi
,
K. H. S. Al Rajhi
Sixth International Conference on Digital…
2018
Corpus ID: 13715268
One Hot Encoding (OHE) is currently the norm in text encoding for deep learning neural models. The main problem with OHE is that…
Expand
2016
2016
Multi Spatial Resolution for Image Spam Filtering
N. A. M. Ariff
,
A. Abdullah
,
M. F. Nasrudin
2016
Corpus ID: 64308726
Image spam filtering is a challenging task because spammers are constantly creating new tricks and making anti-spam filters…
Expand
2012
2012
Performance Evaluation of Cryptographic Algorithms
Mohit Mittal
2012
Corpus ID: 61569384
In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic…
Expand
Highly Cited
2011
Highly Cited
2011
The role of optics in future high radix switch design
N. Binkert
,
A. Davis
,
+4 authors
Jung Ho Ahn
International Symposium on Computer Architecture
2011
Corpus ID: 3014285
For large-scale networks, high-radix switches reduce hop and switch count, which decreases latency and power. The ITRS…
Expand
Highly Cited
2010
Highly Cited
2010
Evaluating The Performance of Symmetric Encryption Algorithms
Diaa Salama Abd Elminaam
,
H. M. Abdual-Kader
,
M. M. Hadhoud
International Journal of Network Security
2010
Corpus ID: 14904410
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption…
Expand
Highly Cited
2006
Highly Cited
2006
The BlackWidow High-Radix Clos Network
Steve Scott
,
D. Abts
,
John Kim
,
W. Dally
International Symposium on Computer Architecture
2006
Corpus ID: 7222214
This paper describes the radix-64 folded-Clos network of the Cray BlackWidow scalable vector multiprocessor. We describe the…
Expand
2005
2005
Codes: The Guide to Secrecy From Ancient to Modern Times
R. Mollin
2005
Corpus ID: 61127572
Preface FROM THE RIDDLES OF ANCIENT EGYPT TO CRYPTOGRAPHY IN THE RENAISSANCE-3,500 YEARS IN THE MAKING Antiquity-From Phaistos…
Expand
2004
2004
A System of Formal Notation for Scoring Works of Digital and Variable Media Art
Richard Rinehart
2004
Corpus ID: 10419741
This paper proposes a new approach to conceptualizing digital and media art forms. This theoretical approach will be explored…
Expand
Highly Cited
1996
Highly Cited
1996
Design issues in high performance floating point arithmetic units
S. Oberman
1996
Corpus ID: 16173495
In recent years computer applications have increased in their computational complexity. The industry-wide usage of performance…
Expand
1993
1993
Division with speculation of quotient digits
J. Cortadella
,
T. Lang
Proceedings of IEEE 11th Symposium on Computer…
1993
Corpus ID: 7626475
The speed of SRT-type dividers is mainly determined by the complexity of the quotient-digit selection, so that implementations…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE