Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,295 papers from all fields of science
Search
Sign In
Create Free Account
Checksum
Known as:
Check-sum
, Modular sum
, Checksums
Expand
A checksum is a small-sized datum from a block of digital data for the purpose of detecting errors which may have been introduced during its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adler-32
Analysis of algorithms
Authentication
BATON
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
CAFE: a configurable packet forwarding engine for data center networks
Guohan Lu
,
Yunfeng Shi
,
Chuanxiong Guo
,
Yongguang Zhang
Programmable Routers for Extensible Services of…
2009
Corpus ID: 1287482
Recently, Data Center Networking (DCN) has attracted many research attentions and innovative DCN designs have been proposed [1, 2…
Expand
2008
2008
An upper bound model for TCP and UDP throughput in IPv4 and IPv6
Eric Gamess
,
R. Surós
Journal of Network and Computer Applications
2008
Corpus ID: 7996250
Highly Cited
2007
Highly Cited
2007
Analytical Techniques for Soft Error Rate Modeling and Mitigation of FPGA-Based Designs
H. Asadi
,
M. Tahoori
IEEE Transactions on Very Large Scale Integration…
2007
Corpus ID: 7641743
Radiation-induced soft errors are the major reliability threat for digital VLSI systems. In particular, field-programmable gate…
Expand
Highly Cited
2006
Highly Cited
2006
Measured TCP Performance in CDMA 1x EV-DO Network?
Youngseok Lee
2006
Corpus ID: 16278666
A horn antenna is disclosed having a built-in circular polarizer and a cross polarization attenuator. A square-apertured horn…
Expand
2006
2006
Enabling successful supply chain management : coordination, collaboration, and integration for competitive advantage
A. Hammer
2006
Corpus ID: 114494008
The term Supply Chain Management (SCM) has become a cornerstone term in the academic business literature as well as in general…
Expand
2003
2003
SNARE: a strong security scheme for network-attached storage
Yingwu Zhu
,
Yimin Hu
22nd International Symposium on Reliable…
2003
Corpus ID: 16686166
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key…
Expand
Review
2000
Review
2000
Overview of IEEE 802.11b Security
Sultan Weatherspoon
2000
Corpus ID: 15065327
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…
Expand
1989
1989
Fault tolerant digital systems
V. Prasad
IEEE potentials
1989
Corpus ID: 5654042
Two common dependability measures of fault-tolerant systems, availability and reliability, are defined, and the design of a…
Expand
1976
1976
CHECK SUM METHODS FOR TEST DATA COMPRESSION.
J. Hayes
1976
Corpus ID: 59733797
1976
1976
Buffer Overflow in a Store-and-Forward Network Node
P. Schweitzer
,
S. Lam
IBM Journal of Research and Development
1976
Corpus ID: 11577420
Equilibrium behavior of a store-and-forward network node with finite buffer capacity is studied via a network-of-queues model…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE