Journal articles on the topic 'Byte'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Byte.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tyagi, Vinod, and Ambika Tyagi. "Byte protecting perfect burst code." Discrete Mathematics, Algorithms and Applications 09, no. 04 (August 2017): 1750051. http://dx.doi.org/10.1142/s1793830917500513.
Full textTyagi, Vinod, and Tarun Lata. "bi-Byte correcting non-binary perfect codes." Discrete Mathematics, Algorithms and Applications 11, no. 02 (April 2019): 1950018. http://dx.doi.org/10.1142/s1793830919500186.
Full textTyagi, Vinod, and Amita Sethi. "bi-BYTE CORRECTING PERFECT CODES." Asian-European Journal of Mathematics 07, no. 01 (March 2014): 1350045. http://dx.doi.org/10.1142/s1793557113500459.
Full textJURAYEVA, Nazokat. "OBSERVATION OF THE POETIC UNITY OF THE VERSE IN THE POETRY OF MUHAMMAD RIZA OGAKHI." Art and Design: Social Science 02, no. 01 (February 1, 2022): 9–12. http://dx.doi.org/10.37547/ssa-v2-i1-4.
Full textSonwalkar, Prasun. "Byte by byte." Journalism: Theory, Practice & Criticism 10, no. 3 (April 28, 2009): 378–80. http://dx.doi.org/10.1177/1464884909102580.
Full textFox, Robert. "Culture byte by byte." OCLC Systems & Services: International digital library perspectives 24, no. 4 (October 31, 2008): 192–98. http://dx.doi.org/10.1108/10650750810914193.
Full textXue, Linting, Aditya Barua, Noah Constant, Rami Al-Rfou, Sharan Narang, Mihir Kale, Adam Roberts, and Colin Raffel. "ByT5: Towards a Token-Free Future with Pre-trained Byte-to-Byte Models." Transactions of the Association for Computational Linguistics 10 (2022): 291–306. http://dx.doi.org/10.1162/tacl_a_00461.
Full textLiang, Zheng You, Yi Xuan Tang, and Shuai Chang. "Smallest Cache Utility Algorithm Based on Popularity." Advanced Materials Research 171-172 (December 2010): 358–63. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.358.
Full textKoppel, Tom. "Reading Books Byte by Byte." Scientific American 264, no. 6 (June 1991): 116–17. http://dx.doi.org/10.1038/scientificamerican0691-116b.
Full textMarvin, Kerry A. "General Psychology Byte by Byte." Contemporary Psychology: A Journal of Reviews 41, no. 6 (June 1996): 569–70. http://dx.doi.org/10.1037/002957.
Full textPristiwanto, Pristiwanto, and Abdul Halim Hasugian. "Steganography Formation by utilizing Enhanced Least Significant Bit Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (March 1, 2021): 19–22. http://dx.doi.org/10.54209/infosains.v11i1.38.
Full textWang, Changhan, Kyunghyun Cho, and Jiatao Gu. "Neural Machine Translation with Byte-Level Subwords." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 9154–60. http://dx.doi.org/10.1609/aaai.v34i05.6451.
Full textZavadskyi, I. O. "Pattern matching by the terms of cache memory limitations." Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics and Mathematics, no. 3 (2019): 56–59. http://dx.doi.org/10.17721/1812-5409.2019/3.8.
Full textMorris, R. J. "Back Byte." History and Computing 6, no. 3 (October 1994): 192. http://dx.doi.org/10.3366/hac.1994.6.3.192.
Full textBurt, Janet. "Back Byte." History and Computing 7, no. 2 (June 1995): 123–24. http://dx.doi.org/10.3366/hac.1995.7.2.123.
Full textNicol, Alexandra. "Back Byte." History and Computing 8, no. 3 (October 1996): 187–90. http://dx.doi.org/10.3366/hac.1996.8.3.187.
Full textYu, P. P. "Byte Back." Journal of Oncology Practice 2, no. 5 (September 1, 2006): 246. http://dx.doi.org/10.1200/jop.2.5.246.
Full textYu, Peter Paul. "Byte Back." Journal of Oncology Practice 2, no. 5 (September 2006): 246. http://dx.doi.org/10.1200/jop.2006.2.5.246.
Full textPollitt, Mark M. "Byte/Counterbyte." Journal of Digital Forensic Practice 1, no. 4 (June 22, 2007): 283–84. http://dx.doi.org/10.1080/15567280701418015.
Full textHong, Feng, Jianquan Zhang, Shigui Qi, and Zheng Li. "PCM-2R: Accelerating MLC PCM Writes via Data Reshaping and Remapping." Mobile Information Systems 2022 (July 16, 2022): 1–19. http://dx.doi.org/10.1155/2022/9552517.
Full textTyagi, Vinod, and Tarun Lata. "Restricted bi-byte correcting non-binary optimal codes." Discrete Mathematics, Algorithms and Applications 11, no. 02 (April 2019): 1950019. http://dx.doi.org/10.1142/s1793830919500198.
Full textGulmuradovna, Juraeva Nazokat. "The Relationship of Rubai and Bytes in Classical Literature." International Journal of Multicultural and Multireligious Understanding 7, no. 7 (August 8, 2020): 344. http://dx.doi.org/10.18415/ijmmu.v7i7.1857.
Full textSun, Shaofei, Hongxin Zhang, Liang Dong, Xiaotong Cui, Weijun Cheng, and Muhammad Saad Khan. "A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm." Sensors 19, no. 24 (December 15, 2019): 5542. http://dx.doi.org/10.3390/s19245542.
Full textZhou, Hai Yan. "A Pattern Matching Algorithm for Double-Type Characters." Applied Mechanics and Materials 571-572 (June 2014): 461–64. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.461.
Full textSatman, Mehmet Hakan, and Emre Akadal. "Machine-coded genetic operators and their performances in floating-point genetic algorithms." International Journal of Advanced Mathematical Sciences 5, no. 1 (January 25, 2017): 8. http://dx.doi.org/10.14419/ijams.v5i1.7128.
Full textKurnianto, Danny, Eka Wahyudi, and Muntaqo Alfin Amanaf. "Kinerja Jaringan ZigBee pada Topologi Star dan Tree dengan Interferensi Sinyal Wi-Fi Pada Sistem Presensi Mahasiswa." Jurnal Fokus Elektroda : Energi Listrik, Telekomunikasi, Komputer, Elektronika dan Kendali) 6, no. 1 (February 26, 2021): 19. http://dx.doi.org/10.33772/jfe.v6i1.15879.
Full textRuzhentsev, Victor. "The conditions of provable security of block ciphers against truncated differential attack." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (June 2015): 176–84. http://dx.doi.org/10.1556/012.2015.52.2.1307.
Full textBarman, Ludovic, Alexandre Dumur, Apostolos Pyrgelis, and Jean-Pierre Hubaux. "Every Byte Matters." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 2 (June 23, 2021): 1–45. http://dx.doi.org/10.1145/3463512.
Full textTomei, Matthew, Shomit Das, Mohammad Seyedzadeh, Philip Bedoukian, Bradford Beckmann, Rakesh Kumar, and David Wood. "Byte-Select Compression." ACM Transactions on Architecture and Code Optimization 18, no. 4 (December 31, 2021): 1–27. http://dx.doi.org/10.1145/3462209.
Full textHinchcliffe, J. "Bite to byte." British Dental Journal 200, no. 10 (May 2006): 595. http://dx.doi.org/10.1038/sj.bdj.4813672.
Full textBENNER, JANE. "Take a byte." Nursing 35, no. 6 (June 2005): 73. http://dx.doi.org/10.1097/00152193-200506000-00050.
Full textMaynard Smith, John. "Byte-sized evolution." Nature 355, no. 6363 (February 1992): 772–73. http://dx.doi.org/10.1038/355772a0.
Full textBaumann, Paul, and Silvia Santini. "Every Byte Counts." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, no. 2 (June 30, 2017): 1–29. http://dx.doi.org/10.1145/3090052.
Full textFraser, Peter J. "CABIOS FIRST BYTE." Bioinformatics 1, no. 4 (1985): 219–24. http://dx.doi.org/10.1093/bioinformatics/1.4.219.
Full textHenderson, Roger. "Henderson byte: Multiferroics." Preview 2020, no. 205 (March 3, 2020): 30. http://dx.doi.org/10.1080/14432471.2020.1720675.
Full textDomanski, Grzegorz, Bogumil Konarzewski, Robert Kurjata, Janusz Marzec, Krzysztof Zaremba, Michal Dziewiecki, Marcin Ziembicki, and Andrzej Rychter. "The study of radiation damage of EPROM 2764 memory." Nuclear Technology and Radiation Protection 31, no. 3 (2016): 233–39. http://dx.doi.org/10.2298/ntrp1603233d.
Full textHu, Xinyi, and Yaqun Zhao. "Research on Plaintext Restoration of AES Based on Neural Network." Security and Communication Networks 2018 (November 18, 2018): 1–9. http://dx.doi.org/10.1155/2018/6868506.
Full textH, Mahmudul, Sirajum M, Syed N.S, A. K.M. F.H, Shahina H, and Tasnim I.R. "Design and Development of an LNB based DVB-S receiver." International Journal of Engineering & Technology 7, no. 3.19 (September 7, 2018): 66. http://dx.doi.org/10.14419/ijet.v7i3.19.16989.
Full textRadha, K., B. Thirumala Rao, Shaik Masthan Babu, K. Thirupathi Rao, V. Krishna Reddy, and P. Saikiran. "Service Level Agreements in Cloud Computing and Big Data." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 1 (February 1, 2015): 158. http://dx.doi.org/10.11591/ijece.v5i1.pp158-165.
Full textSun, Shaofei, Hongxin Zhang, Xiaotong Cui, Liang Dong, Muhammad Saad Khan, and Xing Fang. "Multibyte Electromagnetic Analysis Based on Particle Swarm Optimization Algorithm." Applied Sciences 11, no. 2 (January 18, 2021): 839. http://dx.doi.org/10.3390/app11020839.
Full textWANG, XING-YUAN, FENG CHEN, TIAN WANG, DAHAI XU, and YUTIAN MA. "ATTACK TO AN IMAGE ENCRYPTION BASED ON CHAOTIC LOGISTIC MAP." International Journal of Modern Physics B 27, no. 31 (November 28, 2013): 1350196. http://dx.doi.org/10.1142/s0217979213501968.
Full textJohnson, Barbara A., R. Neff, and D. Rehm. "First Byte in Spanish." Modern Language Journal 69, no. 1 (1985): 107. http://dx.doi.org/10.2307/327918.
Full textHenderson, Roger. "Henderson byte: Anders Celsius." Preview 2021, no. 213 (July 4, 2021): 21. http://dx.doi.org/10.1080/14432471.2021.1963595.
Full textEtzion, T. "Perfect byte-correcting codes." IEEE Transactions on Information Theory 44, no. 7 (1998): 3140–46. http://dx.doi.org/10.1109/18.737544.
Full textCheshire, Stuart, and Mary Baker. "Consistent overhead byte stuffing." ACM SIGCOMM Computer Communication Review 27, no. 4 (October 1997): 209–20. http://dx.doi.org/10.1145/263109.263168.
Full textAllman, Mark. "TCP byte counting refinements." ACM SIGCOMM Computer Communication Review 29, no. 3 (July 1999): 14–22. http://dx.doi.org/10.1145/505724.505727.
Full textCheshire, S., and M. Baker. "Consistent overhead byte stuffing." IEEE/ACM Transactions on Networking 7, no. 2 (April 1999): 159–72. http://dx.doi.org/10.1109/90.769765.
Full textHenderson, Roger. "Henderson byte: Georg Ohm." Preview 2019, no. 200 (May 4, 2019): 16. http://dx.doi.org/10.1080/14432471.2019.1623158.
Full textHenderson, Roger. "Henderson byte: Michael Faraday." Preview 2019, no. 202 (September 3, 2019): 20. http://dx.doi.org/10.1080/14432471.2019.1673281.
Full textSNOB, THEO D. "Bark Worse Than Byte." New Library World 87, no. 2 (February 1986): 24. http://dx.doi.org/10.1108/eb038667.
Full text