Skip to search formSkip to main contentSkip to account menu

Byte

Known as: Bytes, The Evolution of the Byte, Zigabyte 
The byte (/ˈbaɪt/) is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Bilinear models has been shown to achieve impressive performance on a wide range of visual tasks, such as semantic segmentation… 
Highly Cited
2010
Highly Cited
2010
While differential behavior of modern ciphers in a single secret key scenario is relatively well understood, and simple… 
Review
2010
Review
2010
Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the… 
Highly Cited
2007
Highly Cited
2007
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory… 
Highly Cited
2007
Highly Cited
2007
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have been successfully used in the context of… 
Highly Cited
2005
Highly Cited
2005
The TurbSim stochastic inflow turbulence code was developed to provide a numerical simulation of a full-field flow that contains… 
Highly Cited
2001
Highly Cited
2001
From the Publisher: This is the authoritative reference guide to the ARM RISC architecture. Produced by the architects that are… 
Highly Cited
2001
Highly Cited
2001
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several… 
Highly Cited
1999
Highly Cited
1999
Side channel cryptanalysis techniques, such as the analysis of instantaneous power consumption, have been extremely effective in… 
Highly Cited
1987
Highly Cited
1987
The debugging cycle is the most common methodology for finding and correcting errors in sequential programs. Cyclic debugging is…