Limpar
118 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Revisado por pares

Laura U. Marks,

... 23In short, we have abundant aesthetic models for media works that celebrate low technology, slow speed, and small files. I am particularly excited about ASCII movies. You can build them from scratch, or ... Sharma to convert video frames to frames of ASCII text.24 Low-res, small-file media are sexy, literally, because unlike high-resolution media that, in Marshall McLuhan's term, "push" out at the viewer, these crunchy and approximate movies can draw you in.In August 2020, with friends in Vancouver, I will launch the Small File Media Festival that will stream works of extremely limited file size, to show that ...

Tópico(s): Digital

2020 - The Visual Studies Workshop | Afterimage

Artigo Acesso aberto Revisado por pares

Frederick Adam Wright,

... chapter explores the history and characteristics of online media such as textfiles, ASCII text-only ezines, home pages, online journals, online magazines, and weblogs, arguing that their legacy influenced the work of zine publishers online.The fifth chapter explains ...

Tópico(s): Digital Games and

2008 - Michigan Publishing | Journal of Electronic Publishing

Artigo Revisado por pares

Till A. Heilmann,

... A ‘close reading’ of the technical specifications of ASCII - a standard designed in the early 1960s to work across multiple technological platforms - will reveal the extent to which this code incorporates the materiality of media such as punched tape and teletype terminals.

Tópico(s): Advanced Steganography and Watermarking Techniques

2015 - Transcript Verlag | Digital Culture & Society

Artigo

Gregory P. Hamill, R. Jenkins, W. N. Schreiner,

... information stored in JCAMP-DX format is in ASCII characters. Therefore, these data are printable, easily read by the user and compatible with almost any computer or media storage device. Codes defining the information are primarily in shortened, but readable, English. The task group is completing the work on this project and will be presenting its ...

Tópico(s): Nuclear Physics and Applications

1989 - International Centre for Diffraction Data | Advances in X-ray Analysis

Artigo Revisado por pares

Sally Kuhlenschmidt, Charmaine Mosby,

... conceptual distinctions among Fixed-Format, Electronic, and Meta-media Editors. We propose a keyboard editing/commenting technique that will work across platforms and software programs and in every mode of electronic communication including simple e-mail. This ASCII based system uses only four symbols in various ...

Tópico(s): Wikis in Education and Collaboration

2001 - SAGE Publishing | Journal of Technical Writing and Communication

Capítulo de livro

Joakim Kävrestad,

Perhaps the most important skill for someone working with computer forensics is to know how computers work. In order to locate digital traces of an e-mail, the examiner must know that such traces may look like. While this book is intended for someone who is fairly skilled in the computer world, there are some theories that are extra important for a forensic examiner and this computer theory is presented in this chapter. This includes an overview of encryption and decryption as well as a presentation ...

Tópico(s): Digital

2017 - Springer Nature | SpringerBriefs in computer science

Artigo

Elizabeth T. Borer, Eric W. Seabloom, Matthew B. Jones, Mark Schildhauer,

... at this time, by trying to use only ASCII characters, which are based on the English alphabet, ... file names, variable names, and data values. The ASCII code includes all the English letters (uppercase and ... etc. However, one should avoid using certain specialized ASCII characters in data values, since these can lead to unexpected results. For example, one can encode ASCII values for "tabs," "backspace," and "carriage return" into ...

Tópico(s): Species Distribution and Climate Change

2009 - Ecological Society of America | Bulletin of the Ecological Society of America

Artigo Acesso aberto Revisado por pares

Mike Classon Frangos,

... 12.0pt;font-family:"Calibri",sans-serif;mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:" ... props:yes;font-family:"Calibri",sans-serif;mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:" ...

Tópico(s): Gender, Feminism, and

2021 - Open Library of Humanities | The Comics Grid Journal of Comics Scholarship

Artigo Revisado por pares

Kevin P. Scannell,

... in many African languages are written in plain ASCII. We call the process of converting an ASCII text to its proper Unicode form unicodification. This ...

Tópico(s): Language and cultural evolution

2011 - Springer Science+Business Media | Language Resources and Evaluation

Capítulo de livro Acesso aberto Revisado por pares

Jamie L. Rothfeder, R. Manmatha, Toni M. Rath,

... between the segmented handwritten word images and the ASCII transcriptions. Creating this correspondence or alignment is challenging because the segmentation is often errorful and the ASCII transcription may also have errors in it. Very ...

Tópico(s): Image Processing and 3D Reconstruction

2006 - Springer Science+Business Media | Lecture notes in computer science

Livro Acesso aberto Revisado por pares

Mirosław Kutyłowski, Jaideep Vaidya,

... of ZKPPC protocols and suitable VPAKE protocols for ASCII-based passwords and policies that are commonly used ... this end we introduce a reversible mapping of ASCII characters to integers that can be used to ... and a new randomized password hashing scheme for ASCII-based passwords.

Tópico(s): Big Data Technologies and Applications

2014 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Franziskus Kiefer, Mark Manulis,

... of ZKPPC protocols and suitable VPAKE protocols for ASCII-based passwords and policies that are commonly used ... this end we introduce a reversible mapping of ASCII characters to integers that can be used to ... and a new randomized password hashing scheme for ASCII-based passwords.

Tópico(s): Cryptography and Data Security

2014 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

Ines Jemal, Mohamed Haddar, Omar Cheikhrouhou, Adel Mahfoudhi,

... the input of neural networks. This technique, called ASCII Embedding, aims to efficiently detect web server attacks. ...

Tópico(s): Advanced Malware Detection Techniques

2021 - Springer Science+Business Media | Communications in computer and information science

Artigo Acesso aberto

Seiji Shibata,

... camera. Response data from participants are recorded as ASCII files so that other computer programs such as ...

Tópico(s): Eating Disorders and Behaviors

2002 - Springer Science+Business Media | Behavior Research Methods Instruments &Computers

Capítulo de livro Acesso aberto Revisado por pares

Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao,

... static analysis difficult, be printable to evade non-ASCII filtering, be polymorphic to evade signature-based detection, ...

Tópico(s): Cryptographic Implementations and Security

2011 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Stéphane Duvezin‐Caubet, Malgorzata Rak, Linnka Lefebvre‐Legendre, Emmanuel Tétaud, Nathalie Bonnefoy, Jean‐Paul di Rago,

... if they cannot express ARG8m. As expected, the ascii usually contained two spores, both respiratory growth-deficient ... as well, although to a lesser extent, with ascii from the wild type SDC12 strain. It might ...

Tópico(s): Photosynthetic Processes and Mechanisms

2006 - Elsevier BV | Journal of Biological Chemistry

Artigo Revisado por pares

Elisabeth Johnson,

... size:12.0pt; font-family:Cambria,serif; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family: ...

Tópico(s): Critical Race Theory in Education

2012 - Routledge | JCT

Artigo

Boris Berenfeld,

... 2] Even though messages were limited to nongraphical ASCII text, the ability for one class to easily ...

Tópico(s): Education and Technology Integration

1996 - 1105 Media | THE journal

Artigo Acesso aberto Revisado por pares

Ritzky Karina Brahmana, Rayenda Khresna Brahmana,

... 11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:" ...

Tópico(s): Knowledge Management and Sharing

2013 - University of Indonesia | The South East Asian Journal of Management

Artigo Acesso aberto Revisado por pares

Paul Mihailidis, James Cohen,

... 11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family: ...

Tópico(s): Impact of Technology on Adolescents

2013 - Ubiquity Press | Journal of Interactive Media in Education

Artigo Acesso aberto Revisado por pares

Pascale Roux, Muriel Delepierre, Michel Goldberg, Alain-F. Chaffotte,

... least 3 times. The files were converted into ASCII files by the ISA/hda ASCII conversion subroutine of the CD6 software, and data ...

Tópico(s): Enzyme Structure and Function

1997 - Elsevier BV | Journal of Biological Chemistry

Artigo Brasil Produção Nacional

Cláudia Cristiane Filgueira Martins Rodrigues, Petala Tuani Cândido de Oliveira Sanvador, Yole Matias Silveira de Assis, Andréa Tayse de Lima Gomes, Manacés dos Santos Bezerril, Viviane Euzébia Pereira Santos,

... 11.0pt; font-family:Calibri,sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family: ...

Tópico(s): Occupational Health and Burnout

2017 - | Revista de Enfermagem UFPE on line

Artigo Acesso aberto Revisado por pares

BURHAN FAJRIANSYAH, Muhammad Ichwan, Ratna Susana,

... Evaluasi dilakukan dengan mengirimkan data dalam bentuk karakter ASCII/ bytes secara kontinyu maupun sekuensial melalui komunikasi serial ... evaluation was done by sending a data in ASCII character/ bytes as continuous and sequensial method using ...

Tópico(s): IoT-based Smart Home Systems

2017 - Teknik Elektro Institut Teknologi Nasional Bandung | ELKOMIKA Jurnal Teknik Energi Elektrik Teknik Telekomunikasi & Teknik Elektronika

Capítulo de livro

Nabanita Das, Swagata Paul, Bidyut Biman Sarkar, Satyajit Chakrabarti,

... store and analyze such huge amount of mixed ASCII and non-ASCII data efficiently, economically, and in no time. The ...

Tópico(s): Data Stream Mining Techniques

2018 - Springer Nature | Advances in intelligent systems and computing

Artigo Acesso aberto Revisado por pares

Wenyu Zhang, Yaqun Zhao, Sijie Fan,

... we propose the feature extraction scheme based on ASCII statistics of ciphertexts which decrease the dimension of ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Hindawi Publishing Corporation | Security and Communication Networks

Capítulo de livro Revisado por pares

Masayuki Takeda, Satoru Miyamoto, Takuya Kida, Ayumi Shinohara, Shuichi Fukamachi, Takeshi Shinohara, Setsuo Arikawa,

... at the same speed as on an ordinary ASCII text file, without false detection. The technique is ...

Tópico(s): Web Data Mining and Analysis

2002 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Sunil Kumar Muttoo, Vinay Kumar, Abhishek Bansal,

... corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the ...

Tópico(s): Digital

2012 - Taylor & Francis | International Journal of Information Security and Privacy

Capítulo de livro Revisado por pares

Harpreet Kaur, Raman Maini,

... and Hamming Distance (H. Dist) and also Hashes (ASCII-based hashing) on token sequences to detect matching ... From the simulation, it has been observed that ASCII-based hashing performs better than other techniques in ... database size, whereas hashing handles this issue efficiently. ASCII-based hashing handles the issue of scalability very ...

Tópico(s): Advanced Malware Detection Techniques

2019 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Acesso aberto Revisado por pares

NGopi Chander,

... in the American Standard Code for Information Interchange (ASCII) encoding or in the binary encoding.[47] Mostly, ... used if the file size is small and ASCII encoding is followed in debugging situations. Many formats ...

Tópico(s): Dental Implant Techniques and Outcomes

2020 - Springer Science+Business Media | The Journal of Indian Prosthodontic Society

Artigo Revisado por pares

Jane Flax,

... Their Abusers, PoLAR: Political html_ent glyph="@amp;" ascii=" "/ Legal Anthropology Review 20, no.22 (Nov 1997): ...

Tópico(s): Gender Roles and Identity Studies

1987 - University of Chicago Press | Signs