Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,118,443 papers from all fields of science
Search
Sign In
Create Free Account
Byte
Known as:
Bytes
, The Evolution of the Byte
, Zigabyte
Expand
The byte (/ˈbaɪt/) is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
32-bit
AGI-Plan
Address space
BSAVE (bitmap format)
Expand
Broader (1)
Computer memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Compact Bilinear Pooling
Yang Gao
,
Oscar Beijbom
,
Ning Zhang
,
Trevor Darrell
Computer Vision and Pattern Recognition
2015
Corpus ID: 1532984
Bilinear models has been shown to achieve impressive performance on a wide range of visual tasks, such as semantic segmentation…
Expand
Highly Cited
2010
Highly Cited
2010
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
A. Biryukov
,
I. Nikolic
International Conference on the Theory and…
2010
Corpus ID: 2296567
While differential behavior of modern ciphers in a single secret key scenario is relatively well understood, and simple…
Expand
Review
2010
Review
2010
An Overview of IP Flow-Based Intrusion Detection
A. Sperotto
,
Gregor Schaffrath
,
R. Sadre
,
C. Morariu
,
A. Pras
,
B. Stiller
IEEE Communications Surveys and Tutorials
2010
Corpus ID: 8364569
Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the…
Expand
Highly Cited
2007
Highly Cited
2007
Grain: a stream cipher for constrained environments
Martin Hell
,
T. Johansson
,
W. Meier
International Journal of Wireless and Mobile…
2007
Corpus ID: 784379
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory…
Expand
Highly Cited
2007
Highly Cited
2007
Dytan: a generic dynamic taint analysis framework
J. Clause
,
Wanchun Li
,
A. Orso
International Symposium on Software Testing and…
2007
Corpus ID: 11142970
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have been successfully used in the context of…
Expand
Highly Cited
2005
Highly Cited
2005
TurbSim User's Guide
B. J. Jonkman
,
M. L., Jr. Buhl
2005
Corpus ID: 118221387
The TurbSim stochastic inflow turbulence code was developed to provide a numerical simulation of a full-field flow that contains…
Expand
Highly Cited
2001
Highly Cited
2001
ARM Architecture Reference Manual
D. Seal
2001
Corpus ID: 64907075
From the Publisher: This is the authoritative reference guide to the ARM RISC architecture. Produced by the architects that are…
Expand
Highly Cited
2001
Highly Cited
2001
Chaos and cryptography: block encryption ciphers based on chaotic maps
G. Jakimoski
,
L. Kocarev
2001
Corpus ID: 1424006
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several…
Expand
Highly Cited
1999
Highly Cited
1999
Towards Sound Approaches to Counteract Power-Analysis Attacks
Suresh Chari
,
C. Jutla
,
J. Rao
,
P. Rohatgi
Annual International Cryptology Conference
1999
Corpus ID: 16695847
Side channel cryptanalysis techniques, such as the analysis of instantaneous power consumption, have been extremely effective in…
Expand
Highly Cited
1987
Highly Cited
1987
Debugging Parallel Programs with Instant Replay
T. LeBlanc
,
J. Mellor-Crummey
IEEE transactions on computers
1987
Corpus ID: 2791553
The debugging cycle is the most common methodology for finding and correcting errors in sequential programs. Cyclic debugging is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE