Academic literature on the topic 'Byte'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byte.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Byte"
Tyagi, Vinod, and Ambika Tyagi. "Byte protecting perfect burst code." Discrete Mathematics, Algorithms and Applications 09, no. 04 (2017): 1750051. http://dx.doi.org/10.1142/s1793830917500513.
Full textTyagi, Vinod, and Tarun Lata. "bi-Byte correcting non-binary perfect codes." Discrete Mathematics, Algorithms and Applications 11, no. 02 (2019): 1950018. http://dx.doi.org/10.1142/s1793830919500186.
Full textTyagi, Vinod, and Amita Sethi. "bi-BYTE CORRECTING PERFECT CODES." Asian-European Journal of Mathematics 07, no. 01 (2014): 1350045. http://dx.doi.org/10.1142/s1793557113500459.
Full textJURAYEVA, Nazokat. "OBSERVATION OF THE POETIC UNITY OF THE VERSE IN THE POETRY OF MUHAMMAD RIZA OGAKHI." Art and Design: Social Science 02, no. 01 (2022): 9–12. http://dx.doi.org/10.37547/ssa-v2-i1-4.
Full textSokolovskyi, Vladyslav, Eduard Zharikov, Sergii Telenyk, Grzegorz Nowakowski, Svitlana Popereshnyak, and Mykhailo Marynenko. "Devising a method for detecting and correcting multi-bit data transmission errors in Iot systems based on the Golay code." Eastern-European Journal of Enterprise Technologies 2, no. 9 (134) (2025): 14–23. https://doi.org/10.15587/1729-4061.2025.326222.
Full textSonwalkar, Prasun. "Byte by byte." Journalism: Theory, Practice & Criticism 10, no. 3 (2009): 378–80. http://dx.doi.org/10.1177/1464884909102580.
Full textSura, Sura, Rihab .., AbdulRahman Kareem .., et al. "Discovering Unknown Non-Consecutive Double Byte Biases in RC4 Stream Cipher Algorithm." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 75–83. http://dx.doi.org/10.54216/jcim.130206.
Full textXue, Linting, Aditya Barua, Noah Constant, et al. "ByT5: Towards a Token-Free Future with Pre-trained Byte-to-Byte Models." Transactions of the Association for Computational Linguistics 10 (2022): 291–306. http://dx.doi.org/10.1162/tacl_a_00461.
Full textLiang, Zheng You, Yi Xuan Tang, and Shuai Chang. "Smallest Cache Utility Algorithm Based on Popularity." Advanced Materials Research 171-172 (December 2010): 358–63. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.358.
Full textWang, Ling. "Computer Hardware and Network Data Transmission based on Internet of Things Communication Technology." Scalable Computing: Practice and Experience 24, no. 2 (2023): 127–37. http://dx.doi.org/10.12694/scpe.v24i2.2146.
Full textDissertations / Theses on the topic "Byte"
Johansson, Sanna, and Gona Mohammed. "Byte av hissbeklädnad." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Maskinteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18446.
Full textOrhan, Banu, and Hussein Samir Ali. "Omstruktureringar vid VD-byte." Thesis, Södertörn University College, School of Business Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-3133.
Full textAfverberg, Marcus. "Optimering vid byte av fyllningsplatta." Thesis, Karlstads universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68164.
Full textBroman, Monica, and Margareta Eklöv. "Läkemedelsöverföring vid byte av vårdform. Litteraturstudie." Thesis, University of Gävle, Department of Caring Sciences and Sociology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-773.
Full textNorling, Jessica, and Emelie Rönnqvist. "Tidsintervall för byte av perifier venkateter." Thesis, Örebro universitet, Institutionen för hälsovetenskap och medicin, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-22337.
Full textChamoun, Simon. "Byte av kontaktdonsgränssnitt för Scania bromssystem." Thesis, KTH, Maskinkonstruktion (Inst.), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99263.
Full textLennartsson, Aron. "Byte av styrsystem i mellantork B." Thesis, Högskolan Väst, Avd för elektro- och automationsteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-3698.
Full textJonsson, Jakob. "Processjämförelse : Byte av kommunikationsutrustning i elnätet." Thesis, Linnéuniversitetet, Institutionen för fysik och elektroteknik (IFE), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-53352.
Full textSvensson, Thea, and Sandra Sunnegårdh. "Lyftverktyg för ergonomiskt byte av lastbilsbatterier." Thesis, KTH, Maskinkonstruktion (Inst.), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168913.
Full textEkman, Maud, and Annika Lingeby. "Byte av styrsystem för en CNC-svarv." Thesis, Linköping University, Department of Science and Technology, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2234.
Full textBooks on the topic "Byte"
Mashaw, Bijan. Programming byte by byte: Structured FORTRAN 77. 2nd ed. American Computer Press, 1987.
Find full textBreez, Daniels, Walstad Karon ill, and Finer Suzi ill, eds. Computers don't byte. 2nd ed. Teacher Created Materials, 2001.
Find full textGarand, Geneviève, David Hirmes, Cody Lindley, et al. Byte-Size Flash MX. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5207-8.
Full textBook chapters on the topic "Byte"
Weik, Martin H. "byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1995.
Full textHolschbach, Susanne. "Foto/Byte." In Medien Kunst Netz 2. Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-27506-1_7.
Full textHolschbach, Susanne. "Foto/Byte." In Medien Kunst Netz 2. Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-27506-1_8.
Full textGomez, Jeff. "Byte flight." In Print is Dead. Palgrave Macmillan US, 2008. http://dx.doi.org/10.1007/978-1-4299-5477-8_2.
Full textFortner, Brand. "Byte Numbers." In The Data Handbook. Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4612-2538-6_3.
Full textWeik, Martin H. "attribute byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1004.
Full textRennie, Frank, and Keith Smyth. "Bit/byte." In Digital Learning: The Key Concepts, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-21.
Full textWeik, Martin H. "bit byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1597.
Full textWeik, Martin H. "displacement byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5311.
Full textHunt, John. "Byte Code Protection." In Java for Practitioners. Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-0843-6_36.
Full textConference papers on the topic "Byte"
Aljaber, Rozan A., and Gheith A. Abandah. "Automatic Diacritization of Arabic Text and Poetry Using Pretrained Byte-to-Byte Language Models and Multiphase Training." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013629.
Full textXiang, Zhenggui. "Multi-byte Hash based CSV Load in Bioinformatics." In 2024 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). IEEE, 2024. https://doi.org/10.1109/bibm62325.2024.10822437.
Full textNishiyama, Hikaru, Daisuke Fujimoto, and Yuichi Hayashi. "Controlling Faulty Byte Outputs with IEMI against Cryptographic ICs." In 2024 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo). IEEE, 2024. http://dx.doi.org/10.1109/emccompo61192.2024.10742058.
Full textDurge, Renuka S., and Vaishali M. Deshmukh. "Analyzing Byte Level Tokenization for two Layer Encryption Technique." In 2024 2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry (IDICAIEI). IEEE, 2024. https://doi.org/10.1109/idicaiei61867.2024.10842702.
Full textHsiao, Roger, Liuhui Deng, Erik McDermott, Ruchir Travadi, and Xiaodan Zhuang. "Optimizing Byte-Level Representation For End-To-End ASR." In 2024 IEEE Spoken Language Technology Workshop (SLT). IEEE, 2024. https://doi.org/10.1109/slt61566.2024.10832272.
Full textSimelane, Sicelo, and Peter Olukanmi. "Optimizing Byte Pair Encoding Tokenization for South African Languages." In 2024 4th International Conference on Advanced Enterprise Information System (AEIS). IEEE, 2024. https://doi.org/10.1109/aeis65978.2024.00022.
Full textErman, Jeffrey, Anirban Mahanti, and Martin Arlitt. "Byte me." In the 3rd annual ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1269880.1269890.
Full textKim, Donghyun, Youn Kyu Lee, and Jongwook Jeong. "NULL byte injection." In MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. ACM, 2022. http://dx.doi.org/10.1145/3492866.3558587.
Full textWang, Xiaolin, Xiao Pang, and Yingwei Luo. "Byte-Map: A Novel Mobile Map Format Using Two-Byte Coordinates." In 2010 IEEE Vehicular Technology Conference (VTC 2010-Fall). IEEE, 2010. http://dx.doi.org/10.1109/vetecf.2010.5594117.
Full textGracia-Tinedo, Raúl, Flavio Junqueira, and Tom Kaitchuck. ""Back to the Byte": Towards Byte-oriented Semantics for Streaming Storage." In MIDDLEWARE '24: 25th International Middleware Conference. ACM, 2024. http://dx.doi.org/10.1145/3700824.3701099.
Full textReports on the topic "Byte"
Stearns, S. D. Authentication of byte sequences. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/5217104.
Full textResearch Institute (IFPRI), International Food Policy. Byte by byte: Policy innovation for transforming Africa’s food system with digital technologies. International Food Policy Research Institute, Center for Development Research University of Bonn, Imperial College London, 2019. http://dx.doi.org/10.2499/9780896296848.
Full textBriscoe, B., and J. Manner. Byte and Packet Congestion Notification. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7141.
Full textAllman, M. TCP Congestion Control with Appropriate Byte Counting (ABC). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3465.
Full textTruong, Vuong, James Chafouleas, Thomas Mosdal, Sophia Bragdon, Megan Bishop, and Jay Clausen. Thermography conversion for optimal noise reduction. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/49414.
Full textLiu, Z., and K. Le. Zero-byte Support for Bidirectional Reliable Mode (R-mode) in Extended Link-Layer Assisted RObust Header Compression (ROHC) Profile. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3408.
Full textAlsanius, Beatrix W., Andreas Nicolaidis Lindqvist, and Ivar Vågsholm. Transport av bladgrönsaker med batteridrivna tunga lastbilar. SLU Future food, Swedish University of Agricultural Sciences, 2023. http://dx.doi.org/10.54612/a.1kv6bthjsp.
Full textBauer, Andrew. In situ and time. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/46162.
Full textvan de Sand, Ron, and Jörg Reiff-Stephan. FrostByte Dataset. Technische Hochschule Wildau, 2021. http://dx.doi.org/10.15771/1894.
Full textLamb, Michael W. Bytes: Weapons of Mass Disruption. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada420703.
Full text