Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Checksum

A computed value which depends on the contents of a block of data and which is transmitted or stored along with the data in order to detect… Expand
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Correct annotation metadata is critical for reproducible and accurate RNA-seq analysis. When files are shared publicly or among… Expand
  • figure 1
  • table 1
  • table 2
2013
2013
For the space application, error detection and correction (EDAC) technique is often adopted to protect memory cells against… Expand
  • table I
  • figure 1
  • figure 2
  • table IV
  • table II
2013
2013
Number entry is a common task in many domains. In safety-critical environments such as air traffic control or on hospital wards… Expand
  • figure 1
Highly Cited
2010
Highly Cited
2010
  • Jean-Claude Pérez
  • Interdisciplinary Sciences: Computational Life…
  • 2010
  • Corpus ID: 54565279
AbstractThis new bioinformatics research bridges Genomics and Mathematics. We propose a universal “Fractal Genome Code Law”: The… Expand
Review
2007
Review
2007
BackgroundOligonucleotide probes that are sequence identical may have different identifiers between manufacturers and even… Expand
  • table 1
  • table 2
2000
2000
IP/UDP/RTP header compression [CRTP] can generate a large number of lost packets when used over links with significant error… Expand
  • figure 1.1
  • table 6.1
  • table 7.1
  • table 7.2
  • figure 10.1
Highly Cited
1999
Highly Cited
1999
We introduce UDF Lite - a lightweight version of UDP with increased flexibility in the form of a partial checksum. It allows… Expand
  • figure 1
  • figure 2
1998
1998
This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and… Expand
  • table 1
  • table 2
1998
1998
Abstract : This report presents testing and improvements to a protocol, raync, for the synchronisation of similar data files in… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
1988
1988
In this paper we describe techniques for efficient calculation of the ISO checksum which, to our knowledge, are not discussed in… Expand
  • table 1
  • table 2