Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Checksum

Known as: Check-sum, Modular sum, Checksums 
A checksum is a small-sized datum from a block of digital data for the purpose of detecting errors which may have been introduced during its… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Abstract We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-a… Expand
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify… Expand
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, we propose and evaluate three techniques for optimizing network performance in the Xen virtualized environment… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and… Expand
  • figure 2
  • figure 1
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
How fast does the Web change? Does most of the content remain unchanged once it has been authored, or are the documents… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
The classic guide to network securityi¾–now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… Expand
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Part 1 Basic: introduction protocol structure error control flow control. Part 2 Specification and modeling: validation models… Expand
  • figure 1.5
  • figure 1.7
  • figure 2.4
  • figure 2.7
  • figure 2.8
Is this relevant?
Highly Cited
1980
Highly Cited
1980
UDP does not guarantee reliability or ordering in the way that TCP does. Datagrams may arrive out of order, appear duplicated, or… Expand
Is this relevant?