Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Checksum

A computed value which depends on the contents of a block of data and which is transmitted or stored along with the data in order to detect… Expand
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
For the space application, error detection and correction (EDAC) technique is often adopted to protect memory cells against… Expand
  • table I
  • figure 1
  • figure 2
  • table IV
  • table II
Is this relevant?
2013
2013
Number entry is a common task in many domains. In safety-critical environments such as air traffic control or on hospital wards… Expand
  • figure 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
  • Jean-Claude Perez
  • Interdisciplinary Sciences: Computational Life…
  • 2010
  • Corpus ID: 54565279
AbstractThis new bioinformatics research bridges Genomics and Mathematics. We propose a universal “Fractal Genome Code Law”: The… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2007
2007
TCP performs poorly in wireless mobile networks due to large bit error rates. Basically, the TCP sender responds to these losses… Expand
  • figure 3
  • figure 4
  • figure 5
  • figure 6
  • table 1
Is this relevant?
2005
2005
The use of ROHC (robust header compression) over low bandwidth and noisy links saves bandwidth and reduces packet loss by… Expand
  • figure 1
  • table II
  • table I
  • figure 2
  • figure 3
Is this relevant?
2005
2005
In this paper an analysis and realization of Data Transmission Control based on Boolean Transformation for increasing the… Expand
  • table I
  • table II
  • table III
  • figure 1
  • figure 3
Is this relevant?
2000
2000
IP/UDP/RTP header compression [CRTP] can generate a large number of lost packets when used over links with significant error… Expand
  • figure 1.1
  • table 6.1
  • table 7.1
  • table 7.2
  • figure 10.1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We introduce UDP Lite – a lightweight version of UDP with increased flexibility in the form of a partial checksum. It allows… Expand
  • figure 1
  • figure 2
Is this relevant?
1998
1998
This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and… Expand
  • table 1
  • table 2
Is this relevant?
1988
1988
In this paper we describe techniques for efficient calculation of the ISO checksum which, to our knowledge, are not discussed in… Expand
  • table 1
  • table 2
Is this relevant?