Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
ECC memory
Known as:
Error correcting code memory
, Error-correcting code memory
, ECC
Expand
Error-correcting code memory (ECC memory) is a type of computer data storage that can detect and correct the most common kinds of internal data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alpha 21064
Apollo VP3
BIOS
CDC 6600
Expand
Broader (1)
Computer memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Low-Latency Successive-Cancellation Polar Decoder Architectures Using 2-Bit Decoding
Bo Yuan
,
K. Parhi
IEEE Transactions on Circuits and Systems Part 1…
2014
Corpus ID: 16170708
Polar codes have emerged as important error correction codes due to their capacity-achieving property. Successive cancellation…
Expand
2014
2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
Azeem Irshad
,
M. Sher
,
C. Faisal
,
Anwer Ghani
,
Mahmood ul Hassan
,
Shehzad Ashraf Chaudhry
Secur. Commun. Networks
2014
Corpus ID: 27196149
Session initiation protocol SIP provides the basis for establishing the voice over internet protocol sessions after…
Expand
Highly Cited
2014
Highly Cited
2014
Compact Dual-Band WLAN Diversity Antennas on USB Dongle Platform
Wen-Jiao Liao
,
Shih-Hsun Chang
,
Jiun-Ting Yeh
,
Bo-Ren Hsiao
IEEE Transactions on Antennas and Propagation
2014
Corpus ID: 21066534
An antenna system comprising two closely spaced chip antennas is proposed for dual-band wireless LAN uses. The distance between…
Expand
2013
2013
Transmit-Only Ultra Wide Band Body Sensors and Collision Analysis
Ho Chee Keong
,
K. Thotahewa
,
M. Yuce
IEEE Sensors Journal
2013
Corpus ID: 11710864
Ultra wide band (UWB) stands out from other wireless technologies used for wireless physiological signal monitoring due to its…
Expand
Highly Cited
2012
Highly Cited
2012
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
De-biao He
,
Jianhua Chen
,
Hu Jin
2012
Corpus ID: 195712224
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
2004
2004
A scalable architecture for elliptic curve point multiplication
K. Järvinen
,
M. Tommiska
,
J. Skyttä
Proceedings. IEEE International Conference on…
2004
Corpus ID: 16298925
An architecture for elliptic curve point multiplication, which is developed especially for FPGAs, is introduced. The point…
Expand
Highly Cited
2002
Highly Cited
2002
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
Wieland Fischer
,
Christophe Giraud
,
E. Knudsen
,
Jean-Pierre Seifert
IACR Cryptology ePrint Archive
2002
Corpus ID: 16995694
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing…
Expand
2001
2001
A Scalable and Reliable Paradigm for Media on Demand
Gavin B. Horn
,
Per Knudsgaard
,
Søren B. Lassen
,
M. Luby
,
Jens Eilstrup Rasmussen
Computer
2001
Corpus ID: 5971420
The authors describe a system for solving some of the conventional problems associated with traditional streaming protocols by…
Expand
1998
1998
Concatenated error correction coding for high-order PRML channels
H. Sawaguchi
,
M. Kondou
,
N. Kobayashi
,
S. Mita
IEEE GLOBECOM (Cat. NO. 98CH36250)
1998
Corpus ID: 61847490
A modified E/sup 2/PRML (ME/sup 2/PRML) channel is optimized for high-density magnetic recording in order to reduce long error…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE