Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,541,795 papers from all fields of science
Search
Sign In
Create Free Account
Bit-oriented protocol
Known as:
Bit oriented
A bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Communications protocol
Data (computing)
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An Area Efficient Built-In Redundancy Analysis for Embedded Memory with Selectable 1-D Redundancy
G. S. Murthy
,
Darvinder Singh
,
Sadulla Shaik
2016
Corpus ID: 64188942
In this paper, a novel redundant mechanism for dual port embedded SRAM is presented. This work relates to 1-D (one dimensional…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2003
2003
Improved algorithms for high rate turbo code weight distribution calculation
E. Rosnes
,
O. Ytrehus
10th International Conference on…
2003
Corpus ID: 60810229
We discuss algorithms for determining exactly the lower terms of the weight distribution of a turbo code. Several improvements of…
Expand
2003
2003
Care bit density and test cube clusters: multi-level compression opportunities
Bernd Könemann
Proceedings 21st International Conference on…
2003
Corpus ID: 17000628
Most of the recently discussed and commercially introduced test stimulus data compression techniques are based on low care bit…
Expand
1999
1999
A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata Over GF (q)
M. Mihaljević
,
Yuliang Zheng
,
Hideki Imai
1999
Corpus ID: 124212735
SUMMARY This paper proposes a novel one-way hash function that can serve as a tool in achieving authenticity and data integrity…
Expand
1998
1998
Direct pattern matching on compressed text
E. Moura
,
G. Navarro
,
N. Ziviani
,
Ricardo Baeza-Yates
Proceedings. String Processing and Information…
1998
Corpus ID: 9211458
We present a fast compression and decompression technique for natural language texts. The novelty is that the exact search can be…
Expand
1997
1997
Whither configurable computing?
C. Ebeling
Proceedings of the Thirtieth Hawaii International…
1997
Corpus ID: 28931735
Configurable computing has captured the imagination of many architects who want performance of application specific hardware…
Expand
1996
1996
Built in self testing for detection of coupling faults in semiconductor memories
M. Karpovsky
,
D. Das
,
H. Vardhan
IEEE International Workshop on Memory Technology…
1996
Corpus ID: 44061354
In this work we investigate the problem of detection and location of single and unlinked multiple pattern sensitive faults in bit…
Expand
1983
1983
Bit oriented data link controls. II
A. Weissberger
1983
Corpus ID: 59764974
For Pt.I see IBID., Vol.22, No.3, p.195-206. This paper discusses how the advent of VLSI chip sets serving specific data…
Expand
1980
1980
An LSI Implementation of an Intelligent CRC Computer and Programmable Character Comparator
A. Weissberger
IEEE transactions on computers
1980
Corpus ID: 20389534
Manufacturers of MOS microprocessors have been expanding their product families to include function or task oriented LSI…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE