Halt and Catch Fire

Known as: Halt, HCF, Stop and Catch Fire 
In computer engineering, Halt and Catch Fire, known by the assembly mnemonic HCF, is an idiom referring to a computer machine code instruction that… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1957-2018
0204019572017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
While traffic signals allow competing flows of traffic to safely cross busy intersections, they inevitably enforce a stop-and-go… (More)
  • figure 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The first decade of the new millennium has been a stage for the rapid development of wireless communication technologies for low… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1) conceal flooding sources and dilute… (More)
  • figure 1
  • table I
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Social network sites (SNSs) provide a new way to organize and navigate an egocentric social network. Are they a fad, briefly… (More)
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The quality-of-service (QoS) guarantees enabled by the new IEEE 802.11 a/e Wireless LAN (WLAN) standard are specifically… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We consider the problem of detecting spatial domain least significant bit (LSB) matching steganography in grayscale images, which… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The process of information hiding is modeled in the context of additive noise. Under an independence assumption, the histogram of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
IP spoofing has been exploited by Distributed Denial of Service (DDoS) attacks to (1) conceal flooding sources and localities in… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 6
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We present a Bayesian framework that combines motion (optical flow) estimation and segmentation based on a representation of the… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Image analysis that produces an image-like array of symbolic or numerical elements (such as edge finding or depth map… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?