Showing 13,921 - 13,940 results of 16,001 for search '"bit"', query time: 0.14s Refine Results
  1. 13921
  2. 13922
  3. 13923
  4. 13924
  5. 13925
  6. 13926

    Cracking the Curious Case of the Cascade Protocol by Anand Choudhary, Ajay Wasan

    Published 2023-01-01
    “…Quantum Key Distribution is one of its integral parts and it necessarily requires the usage of an information reconciliation protocol to correct the errors present in the key bits transmitted via the physical system involved. …”
    Get full text
    Article
  7. 13927

    Tangled Circuits: Characterizing Errors in Experimental Superconducting Quantum Processors by Samach, Gabriel Orr

    Published 2023
    “…As progress is made towards the first generation of error-corrected quantum computers based on physical quantum bits (qubits), researchers require robust techniques for designing, operating, and characterizing coupled multi-qubit systems in the laboratory, and for understanding the errors which arise in such systems. …”
    Get full text
    Get full text
    Thesis
  8. 13928

    Digital pulse width modulator for high-speed DC-DC converters by Tan, Thai Siong

    Published 2018
    “…The DPWM generator operates at a supply voltage of 1.2V with a 5 bits resolution and runs at a high speed of 100MHz. …”
    Get full text
    Final Year Project (FYP)
  9. 13929

    Silently disabling ECUs and enabling blind attacks on the CAN bus by Rogers, M, Rasmussen, K

    Published 2022
    “…Performing this attack requires the ability to flip bits on the bus, but not with any level of sophistication. …”
    Conference item
  10. 13930

    Simple communication complexity separation from quantum state antidistinguishability by Havlíček, V, Barrett, J

    Published 2020
    “…If the conjecture holds, then there is a two-player communication task that can be solved with log <i>d</i> qubits, but requires exact one-way communication of &Omega; (<i>d</i> log <i>d</i>) classical bits.…”
    Journal article
  11. 13931

    Ownership authentication by digital image watermarking based on block truncation coding by Tohidi, Faranak

    Published 2013
    “…In proposed method, considering the texture sub blocks and Least Significant Bits (LSBs of higher mean value and lower mean value) substitution combine together for designing improved the BTC watermarking scheme. …”
    Get full text
    Thesis
  12. 13932
  13. 13933

    Recovering Secrets From Prefix-Dependent Leakage by Ferradi Houda, Géraud Rémi, Guilley Sylvain, Naccache David, Tibouchi Mehdi

    Published 2020-06-01
    “…We discuss how to recover a secret bitstring given partial information obtained during a computation over that string, assuming the computation is a deterministic algorithm processing the secret bits sequentially. That abstract situation models certain types of side-channel attacks against discrete logarithm and RSA-based cryptosystems, where the adversary obtains information not on the secret exponent directly, but instead on the group or ring element that varies at each step of the exponentiation algorithm.…”
    Get full text
    Article
  14. 13934

    How Well Can We Infer Selection Benefits and Mutation Rates from Allele Frequencies? by Jonathan Soriano, Sarah Marzen

    Published 2023-04-01
    “…We calculate limits to their ability in the context of the Wright-Fisher model by first finding the maximal amount of information that can be acquired using allele frequencies about the mutation rate and selection coefficient– at least 2 bits per allele– and then by finding how the organisms would have shaped their mutation rates and selection coefficients so as to maximize the information transfer.…”
    Get full text
    Article
  15. 13935

    Libraries, the long tail and the future of legacy print collections by Genoni, Paul

    Published 2021
    “…Anderson’s long tail theory is an attempt to explain the changes that have occurred to markets as both the records of trade (that is, inventories and catalogues) and the traded items themselves, have become digital rather than physical (or in Anderson’s terms, bits rather than atoms).…”
    Get full text
    Journal Article
  16. 13936

    A secure audio steganography approach by Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah, Jaryani, Farhang, Taherdoost, Hamed, Zeki, Akram M.

    Published 2009
    “…Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.…”
    Get full text
    Proceeding Paper
  17. 13937

    A secure audio steganography approach by Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah

    Published 2009
    “…Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.…”
    Conference or Workshop Item
  18. 13938

    Career distinction : stand out by building your brand / by Arruda, William, 1961-, Dixson, Kirsten, 1968-

    Published 2007
    “…Understand the future of work -- Adopt the career distinction mindset -- Brand yourself for career success -- Know yourself to grow yourself -- Remember, it's what they think that counts -- Define your brand community -- Tell your brand story -- Create your career-marketing tools -- Express yourself -- Assess your online identity -- Build your brand in bits and bytes -- Be on-brand in all that you do -- Get a visual identity -- Increase your career karma -- Summary: evolve and resolve.…”
  19. 13939

    B-VGG16: Binary Quantized Convolutional Neuronal Network for image classification by Nicolás Urbano Pintos, Héctor Lacomi, Mario Lavorato

    Published 2022-12-01
    “…Binarized neural networks reduce the amount of memory, and it is possible to implement them with less hardware than those that use real value variables (Floating Point 32 bits). This type of network can be implemented in embedded systems, such as FPGA. …”
    Get full text
    Article
  20. 13940

    Multi‐step incremental ADC with extended binary counting by Y. Zhang, C.‐H. Chen, T. He, G.C. Temes

    Published 2016-04-01
    “…The second step reuses the single integrator and extends the accuracy to 18 bits by a binary counting technique. For the same accuracy, the conversion cycle is shortened by a factor of more than 28 as compared with the single‐step IADC.…”
    Get full text
    Article