Byte

Known as: Bytes, The Evolution of the Byte, Zigabyte 
The byte (/ˈbaɪt/) is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1963-2017
020040019632017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
The predicted shift to non-volatile, byte-addressable memory (e.g., Phase Change Memory and Memristor), the growth of “big data… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Modern computer systems have been built around the assumption that persistent storage is accessed via a slow, block-based… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Several existing dynamic binary analysis tools use <i>shadowmemory</i>-they shadow, in software, every byte of memory used by a… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We present a formal model of memory that both captures the low-level features of C's pointers and memory, and that forms the… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly… (More)
  • figure 1
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Hostile network traffic is often "different" from benign traffic in ways that can be distinguished without knowing the nature of… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java… (More)
  • figure 1
  • figure 3
Is this relevant?
1997
1997
Byte stuffing is a process that transforms a sequence of data bytes that may contain 'illegal' or 'reserved' values into a… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1993
Highly Cited
1993
A new non-proprietary secret-key block-enciphering algorithm, SAFER K64 (for Secure And Fast Encryption Routine with a Key of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1983
1983
A cyclic redundancy code can be calculated on bytes instead of bits. One byte-oriented method reduces calculation time by a… (More)
  • figure 1
  • table 2
  • table 3
  • table 6
  • table 7
Is this relevant?