Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,252,464 papers from all fields of science
Search
Sign In
Create Free Account
Zilog Z8
The Zilog Z8 is a microcontroller architecture, originally introduced in 1979, which today also includes the eZ8 Encore!, eZ8 Encore! XP, and eZ8…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
8-bit
Dual in-line package
Flash memory
Harvard architecture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An Analytical Framework for Evaluating Spectrum/Energy Efficiency of Heterogeneous Cellular Networks
Jaya Rao
,
A. Fapojuwo
IEEE Transactions on Vehicular Technology
2016
Corpus ID: 5870085
Achieving high spectrum efficiency (SE) and energy efficiency (EE) is of primary importance for the sustainability of future…
Expand
2014
2014
Reduced modular symmetries of threshold corrections and gauge coupling unification
D. Bailin
,
A. Love
2014
Corpus ID: 53000940
A bstractWe revisit the question of gauge coupling unification at the string scale in orbifold compactifications of the heterotic…
Expand
Highly Cited
2013
Highly Cited
2013
Bent and generalized bent Boolean functions
P. Stănică
,
Thor Martinsen
,
S. Gangopadhyay
,
B. K. Singh
Des. Codes Cryptogr.
2013
Corpus ID: 6519625
In this paper, we investigate the properties of generalized bent functions defined on $${\mathbb{Z}_2^n}$$ with values in…
Expand
Highly Cited
2011
Highly Cited
2011
The fine-tuning of the generalised NMSSM
G. Ross
,
K. Schmidt-Hoberg
2011
Corpus ID: 119220742
2010
2010
Effect of Salinity on Wettability Alteration to Intermediate Gas-Wetting
Stanley Wu
,
A. Firoozabadi
2010
Corpus ID: 53988344
Summary The effect of salinity on the alteration of wettability from waterwetting to intermediate gas-wetting is studied in this…
Expand
2008
2008
Collision attack on NaSHA-512
Ji Li
,
Liangyu Xu
,
Xu Guan
IACR Cryptology ePrint Archive
2008
Corpus ID: 42522063
The hash function NaSHA [1] is a new algorithm proposed for SHA-3. The compression function adopts quasigroup transformations…
Expand
Highly Cited
2007
Highly Cited
2007
Sintering, crystallization and properties of MgO-Al2O3-SiO2 system glass-ceramics containing ZnO
Guohua Chen
,
Xinyu Liu
2007
Corpus ID: 54492976
Highly Cited
1979
Highly Cited
1979
Analysis of Pheromone-Mediated Behaviors in Male Grapholitha molesta, the Oriental Fruit Moth (Lepidoptera: Tortricidae)
T. Baker
,
R. Cardé
1979
Corpus ID: 88280182
In Grapholitha molesta (Busck), the Oriental fruit moth, the behavioral effects of 3 female sex pheromone components, ( Z )-8…
Expand
Highly Cited
1979
Highly Cited
1979
On 3-manifolds that have finite fundamental group and contain Klein bottles
J. Rubinstein
1979
Corpus ID: 42467333
The closed irreducible 3-manifolds with finite fundamental group and containing an embedded Klein bottle can be identified with…
Expand
Review
1978
Review
1978
Applications of computer simulation in health care
W. England
,
S. D. Roberts
Online World Conference on Soft Computing in…
1978
Corpus ID: 16967290
Several hundred computer simulation models have been developed in the last 15 years to solve problems in the nation's health care…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE