Academic literature on the topic 'Byte'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byte.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Byte"
Tyagi, Vinod, and Ambika Tyagi. "Byte protecting perfect burst code." Discrete Mathematics, Algorithms and Applications 09, no. 04 (August 2017): 1750051. http://dx.doi.org/10.1142/s1793830917500513.
Full textTyagi, Vinod, and Tarun Lata. "bi-Byte correcting non-binary perfect codes." Discrete Mathematics, Algorithms and Applications 11, no. 02 (April 2019): 1950018. http://dx.doi.org/10.1142/s1793830919500186.
Full textTyagi, Vinod, and Amita Sethi. "bi-BYTE CORRECTING PERFECT CODES." Asian-European Journal of Mathematics 07, no. 01 (March 2014): 1350045. http://dx.doi.org/10.1142/s1793557113500459.
Full textJURAYEVA, Nazokat. "OBSERVATION OF THE POETIC UNITY OF THE VERSE IN THE POETRY OF MUHAMMAD RIZA OGAKHI." Art and Design: Social Science 02, no. 01 (February 1, 2022): 9–12. http://dx.doi.org/10.37547/ssa-v2-i1-4.
Full textSonwalkar, Prasun. "Byte by byte." Journalism: Theory, Practice & Criticism 10, no. 3 (April 28, 2009): 378–80. http://dx.doi.org/10.1177/1464884909102580.
Full textFox, Robert. "Culture byte by byte." OCLC Systems & Services: International digital library perspectives 24, no. 4 (October 31, 2008): 192–98. http://dx.doi.org/10.1108/10650750810914193.
Full textXue, Linting, Aditya Barua, Noah Constant, Rami Al-Rfou, Sharan Narang, Mihir Kale, Adam Roberts, and Colin Raffel. "ByT5: Towards a Token-Free Future with Pre-trained Byte-to-Byte Models." Transactions of the Association for Computational Linguistics 10 (2022): 291–306. http://dx.doi.org/10.1162/tacl_a_00461.
Full textLiang, Zheng You, Yi Xuan Tang, and Shuai Chang. "Smallest Cache Utility Algorithm Based on Popularity." Advanced Materials Research 171-172 (December 2010): 358–63. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.358.
Full textKoppel, Tom. "Reading Books Byte by Byte." Scientific American 264, no. 6 (June 1991): 116–17. http://dx.doi.org/10.1038/scientificamerican0691-116b.
Full textMarvin, Kerry A. "General Psychology Byte by Byte." Contemporary Psychology: A Journal of Reviews 41, no. 6 (June 1996): 569–70. http://dx.doi.org/10.1037/002957.
Full textDissertations / Theses on the topic "Byte"
Johansson, Sanna, and Gona Mohammed. "Byte av hissbeklädnad." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Maskinteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18446.
Full textOrhan, Banu, and Hussein Samir Ali. "Omstruktureringar vid VD-byte." Thesis, Södertörn University College, School of Business Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-3133.
Full textObjective: The aim of this paper is to see if there are higher restructuring expenses under the item provision for the first year when a new president takes office.
Method: The study was done by a quantitative study. Financial statements have been examined for companies listed on the OMX Stockholm Stock Exchange, Large Cap. We have examined all the companies’ annual reports between the years 2002-2008. We have looked at the experience of restructuring and other expenses that occur in the context of CEO change. In addition, a student t-test done to see whether a link exists between increased restructuring and CEO replacement.
Results and Conclusion: The survey shows that there is no fixed happy that there are more restructurings in the item provision for the first year when a new president takes office. Therefore, we cannot be based on the survey results give us that Big Bath Accounting exists among companies listed on the OMX Stockholm Exchange Large Cap, and this in the post restructuring of CEO replacement.
Draft implicitly Research: An interesting research could be tested taking into account parameters other than restructuring to investigate the existence of Big Bath Accounting. Examples of these parameters can be depreciation of assets. Another interesting research would be conducted by examining all the OMX Stockholm Stock Exchange. And divide companies sect oral and thus see if the phenomenon Big Bath is more prevalent in certain types of industry.
Afverberg, Marcus. "Optimering vid byte av fyllningsplatta." Thesis, Karlstads universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68164.
Full textBroman, Monica, and Margareta Eklöv. "Läkemedelsöverföring vid byte av vårdform. Litteraturstudie." Thesis, University of Gävle, Department of Caring Sciences and Sociology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-773.
Full textNorling, Jessica, and Emelie Rönnqvist. "Tidsintervall för byte av perifier venkateter." Thesis, Örebro universitet, Institutionen för hälsovetenskap och medicin, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-22337.
Full textChamoun, Simon. "Byte av kontaktdonsgränssnitt för Scania bromssystem." Thesis, KTH, Maskinkonstruktion (Inst.), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99263.
Full textDetta examensarbete utfördes på Scania i Södertälje, Sverige. Arbetet undersöker möjligheten att byta ett kontaktdonsgränssnitt som används när det finns ett behov för skarvning av hastighetssensor och vilka konsekvenser detta medför. Det problem som finns med nuvarande kontaktdonsgränssnitt är under monteringen då det kräver mer tid för att genomföra en anslutning på ett tillförlitligt sätt. En komplett anslutning kräver koppling av hon- och han kontakt, insättning av anslutningen i en skyddande hållare, varpå två buntband sätts fast på varje ände av hållaren. Detta gör det tidskrävande, det kräver 20-30 sekunder för att slutföra anslutningen. Om detta problem skulle lösas skulle det spara tid och underlättar monteringen, vilket resulterar i ekonomiska fördelar. Examensarbetet realiserades genom diskussioner med olika sektioner på Scania, studier av tillgänglig dokumentation, observationer vid montering, framtagning av kravspecifikation och leverantörskontakt. De ovan nämnda metoderna resulterade i fyra kontaktdonsförslag: DT och DTMH kontakterna från Deutsch, MCON kontakten från TE connectivity och MLK kontakten från Kostal, var och en av dem överensstämmer med de uppsatta kraven som den omgivande miljön ställer. MLK kontakten från Kostal anses vara den bästa kandidaten eftersom den ansågs vara bäst från produktionssidan då den hade den bästa återkopplingen vid kontaktering. Dessutom, ur en ekonomisk synvinkel så sparar den mer än 1 000 000 kronor (för 150 000 anslutningar) årligen. De föreslagna kontakterna behöver gå igenom Scanias testdokument, TB 1787 innan de godkänns för användning. Förändringen av kontakt påverkar andra komponenter som också måste beaktas vid en förändring. Dessa har kartlagts liksom sensorvariationer för lastbilar, med och utan EBS. Den slutsats som kan dras är att det skulle vara fördelaktigt att ändra kontaktdonsgränssnittet, eftersom det skulle spara tid, pengar och förenkla monteringsprocessen.
Lennartsson, Aron. "Byte av styrsystem i mellantork B." Thesis, Högskolan Väst, Avd för elektro- och automationsteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-3698.
Full textJonsson, Jakob. "Processjämförelse : Byte av kommunikationsutrustning i elnätet." Thesis, Linnéuniversitetet, Institutionen för fysik och elektroteknik (IFE), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-53352.
Full textSvensson, Thea, and Sandra Sunnegårdh. "Lyftverktyg för ergonomiskt byte av lastbilsbatterier." Thesis, KTH, Maskinkonstruktion (Inst.), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168913.
Full textThe paper covers a product development project in which two students develops a tool for lifting heavy lorry batteries, for Scania’s repair shops. The problem is that the space above and on the sides of the batteries is very limited and that the batteries are so heavy that it is considered very ergonomically unfavorable to lift them manually. In order to study the ergonomic aspects, as well as other important aspects, that need to be consideredwhen developing the tool, the students have carried out a wide pre-study. This study has coveredeverything from benchmarking and observations to “safari” where the students themselves triedchanging the batteries a number of times. Numerous interviews and meetings have been held withemployees at Scania – most commonly in order to answer technical queries, but also to obtain feedbackon ideas and concepts.The students have also carried out a parallel project where a general “ergonomic checklist” for designing special tools has been developed. This has been done through deep studies of several ergonomic standards. The list has been revised multiple times after discussing it with the ergonomists at Scania andhas, together with other technical requirement, been used as a foundation for the specification ofrequirements.The ideation process has been carried out through brainstorming and continuous evaluations of theconcepts, using the specification of requirements. At some points matrices has been used to makedecisions between concepts, in order to show the requirements and how the concepts relate to them.The concept’s function and appropriateness have been evaluated through mockups, CAD-models and physical prototypes. It has been an iterative process where some concepts have been rejected when for example detailed sketches has been made. The prototype has also contributed to the discovery of some problems and restrictions.Finally, a practically functioning concept has been developed. The construction has been verified through tests and calculations. Manufacturing methods has been discussed for all components and Scania will receive a concept with full CAD-models and drawings. The product is in other words ready tobe manufactured, as soon as it has gone through minor adjustments and the CE-labeling procedure.
Ekman, Maud, and Annika Lingeby. "Byte av styrsystem för en CNC-svarv." Thesis, Linköping University, Department of Science and Technology, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2234.
Full textExamensarbetet som beskrivs i denna rapport handlar om byte av styrsystem i en CNC-svarv på företaget Precisionsdetaljer Mekatronik i Linköping. Ett Fanuc 5 styrsystem har ersatts av ett modernare Fanuc 21i-styrsystem. Rapporten beskriver det nya styrsystemet och redovisar hur arbetet med att praktiskt byta system har gått till. Arbetet indelades i tre delar, informationssökning, praktiskt arbete och dokumentation. Informationssökningen behövdes både för hopkoppling av de olika delarna och för parameter- och ladderprogrammering. Det praktiska arbetet bestod i att koppla tillsammans de delar som fanns beställda och de delar som skulle tas från det gamla styrsystemet. Dokumentationen ska finnas för framtida bruk, då service och utveckling av systemet ska ske.
This examination work describes changing of a control system in a CNC-lathe. The work has been done at Precisionsdetaljer Mekatronik AB in Linköping, a company with eight to nine employees. One Fanuc 5 control system has been replaced by a modern Fanuc 21i-system. This report describes the new control system and how the practical work has been done. The work has been divided into three parts, information searching, practical work and documentation. Information searching is needed for how to connect the different parts and for parameter-and ladder programming. The practical work consisted of connecting the new parts that were ordered and the parts that should be used from the old control system. The documentation may be used in the future, when service and development of the system will be done.
Books on the topic "Byte"
Mashaw, Bijan. Programming byte by byte: Structured FORTRAN 77. 2nd ed. Livermore, CA: American Computer Press, 1987.
Find full textBook chapters on the topic "Byte"
Weik, Martin H. "byte." In Computer Science and Communications Dictionary, 156. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1995.
Full textHolschbach, Susanne. "Foto/Byte." In Medien Kunst Netz 2, 131–38. Vienna: Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-27506-1_7.
Full textHolschbach, Susanne. "Foto/Byte." In Medien Kunst Netz 2, 139–68. Vienna: Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-27506-1_8.
Full textGomez, Jeff. "Byte flight." In Print is Dead, 11–30. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1007/978-1-4299-5477-8_2.
Full textFortner, Brand. "Byte Numbers." In The Data Handbook, 19–27. New York, NY: Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4612-2538-6_3.
Full textWeik, Martin H. "attribute byte." In Computer Science and Communications Dictionary, 76. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1004.
Full textWeik, Martin H. "bit byte." In Computer Science and Communications Dictionary, 125. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1597.
Full textWeik, Martin H. "displacement byte." In Computer Science and Communications Dictionary, 435. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5311.
Full textHunt, John. "Byte Code Protection." In Java for Practitioners, 427–29. London: Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-0843-6_36.
Full textWeik, Martin H. "single-byte font." In Computer Science and Communications Dictionary, 1595. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17501.
Full textConference papers on the topic "Byte"
Erman, Jeffrey, Anirban Mahanti, and Martin Arlitt. "Byte me." In the 3rd annual ACM workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1269880.1269890.
Full textKim, Donghyun, Youn Kyu Lee, and Jongwook Jeong. "NULL byte injection." In MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3492866.3558587.
Full textWang, Xiaolin, Xiao Pang, and Yingwei Luo. "Byte-Map: A Novel Mobile Map Format Using Two-Byte Coordinates." In 2010 IEEE Vehicular Technology Conference (VTC 2010-Fall). IEEE, 2010. http://dx.doi.org/10.1109/vetecf.2010.5594117.
Full textDemirkan, Ismail. "Improved byte caching techniques." In 2015 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2015. http://dx.doi.org/10.1109/blackseacom.2015.7185100.
Full textCardoso, J. S. "Bandwidth-Efficient Byte Stuffing." In 2007 IEEE International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/icc.2007.1022.
Full textCheshire, Stuart, and Mary Baker. "Consistent overhead byte stuffing." In the ACM SIGCOMM '97 conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/263105.263168.
Full textPogrebnyak, Oleksiy B., Juan H. Sossa Azuela, and Pablo M. Ramirez. "Fast algorithm of byte-to-byte wavelet transform for image compression applications." In International Symposium on Optical Science and Technology, edited by Bahram Javidi and Demetri Psaltis. SPIE, 2002. http://dx.doi.org/10.1117/12.450878.
Full textLe, Franck, Mudhakar Srivatsa, and Arun K. Iyengar. "Byte Caching in Wireless Networks." In 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS). IEEE, 2012. http://dx.doi.org/10.1109/icdcs.2012.39.
Full textCosta-jussà, Marta R., Carlos Escolano, and José A. R. Fonollosa. "Byte-based Neural Machine Translation." In Proceedings of the First Workshop on Subword and Character Level Models in NLP. Stroudsburg, PA, USA: Association for Computational Linguistics, 2017. http://dx.doi.org/10.18653/v1/w17-4123.
Full textLai, Jui-Lin, Kuo-Hung Liao, Yi-Te Lai, and Rong-Jian Chen. "Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte Transformation." In 2013 International Symposium on Biometrics and Security Technologies (ISBAST). IEEE, 2013. http://dx.doi.org/10.1109/isbast.2013.35.
Full textReports on the topic "Byte"
Stearns, S. D. Authentication of byte sequences. Office of Scientific and Technical Information (OSTI), June 1991. http://dx.doi.org/10.2172/5217104.
Full textResearch Institute (IFPRI), International Food Policy. Byte by byte: Policy innovation for transforming Africa’s food system with digital technologies. Washington, DC: International Food Policy Research Institute, Center for Development Research University of Bonn, Imperial College London, 2019. http://dx.doi.org/10.2499/9780896296848.
Full textBriscoe, B., and J. Manner. Byte and Packet Congestion Notification. RFC Editor, February 2014. http://dx.doi.org/10.17487/rfc7141.
Full textAllman, M. TCP Congestion Control with Appropriate Byte Counting (ABC). RFC Editor, February 2003. http://dx.doi.org/10.17487/rfc3465.
Full textLiu, Z., and K. Le. Zero-byte Support for Bidirectional Reliable Mode (R-mode) in Extended Link-Layer Assisted RObust Header Compression (ROHC) Profile. RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3408.
Full textBauer, Andrew. In situ and time. Engineer Research and Development Center (U.S.), December 2022. http://dx.doi.org/10.21079/11681/46162.
Full textLamb, Michael W. Bytes: Weapons of Mass Disruption. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada420703.
Full textSeybold, Patricia. Good-Bye Carly. Boston, MA: Patricia Seybold Group, February 2005. http://dx.doi.org/10.1571/psgp2-9-05cc.
Full textStockman, Tom, Adah Zhang, Benjamin Wilson, James Garner, Sydney Dorawa, and Nathan Shoman. FY 22 Project Name: Boots versus Bytes. Office of Scientific and Technical Information (OSTI), February 2023. http://dx.doi.org/10.2172/1923622.
Full textWaldfogel, Joel. Bye, Bye, Miss American Pie? The Supply of New Recorded Music Since Napster. Cambridge, MA: National Bureau of Economic Research, March 2011. http://dx.doi.org/10.3386/w16882.
Full text