Loris D’Antoni, Margus Veanes,
... not scale. In our evaluation we use a UTF-16 to UTF-8 translator (utf8encoder) and a UTF-8 to UTF-16 translator (utf8decoder). We show, among other properties, that ...
Tópico(s): Software Testing and Debugging Techniques
2013 - Springer Science+Business Media | Lecture notes in computer science
... XML mandates support for the UTF-8 and UTF-16 encodings of the ISO 10646 character encoding standard, ...
Tópico(s): Web Data Mining and Analysis
1998 - Association for Information Science and Technology | Bulletin of the American Society for Information Science and Technology
Saqib Hakak, Amirrudin Kamsin, Jhon Veri, Rajab Ritonga, Tutut Herawan,
... text, segmentation is done based on clitics using UTF-16 encoding. On testing the proposed framework with comparison ...
Tópico(s): Spam and Phishing Detection
2018 - Springer Nature | Advances in intelligent systems and computing
Rong Pan, Qinheping Hu, Gaowei Xu, Loris D’Antoni,
... ii) operate over very large alphabets---e.g., UTF-16 and ASCII---and iii) employ complex constructs---e. ...
Tópico(s): Network Packet Processing and Optimization
2019 - Association for Computing Machinery | Proceedings of the ACM on Programming Languages
... often represented using Unicode formats (UTF-8 and UTF-16). We frequently have to convert text from one ...
Tópico(s): Error Correcting Code Techniques
2021 - Wiley | Software Practice and Experience
Yahya Khan, Ali Algarni, Aisha Fayomi, Abdullah M. Almarashi,
... attacked. DSTS algorithm overcomes its limitations by using UTF-16 coding and enhances the security of CASE with ... PHM from 2.06% to 1% due to UTF-16 coding. Using the UTF-8 method, the authors ...
Tópico(s): Coding theory and cryptography
2021 - Hindawi Publishing Corporation | Mathematical Problems in Engineering
Tuhin Karmakar, Saptarshi Biswas, Indrajit Das, Subhrapratim Nath,
... This scheme integrates modular arithmetic applied on Unicode UTF-16 encoding standards coupled with AES and RSA algorithms. ...
Tópico(s): Cryptography and Data Security
2022 - Taylor & Francis | Journal of Discrete Mathematical Sciences and Cryptography
Robert Clausecker, Daniel Lemire,
... between the most common formats: UTF‐8 and UTF‐16. With our novel algorithms, we are often twice ... we transcode Chinese text from UTF‐8 to UTF‐16 at more than 5 GiB using fewer than ...
Tópico(s): Algorithms and Data Compression
2023 - Wiley | Software Practice and Experience
... represent text using Unicode formats (UTF-8 and UTF-16). The UTF-8 format is increasingly popular, especially ... XML, HTML, JSON, Rust, Go, Swift, Ruby). The UTF-16 format is most common in Java, .NET, and ...
Tópico(s): Advanced Data Compression Techniques
2021 - Springer Science+Business Media | Lecture notes in computer science
... text processing applications such as UTF-8 to UTF-16 transcoding, XML parsing, string search and regular expression ...
Tópico(s): Advanced Data Storage Technologies
2009 - ACM SIGARCH | ACM SIGARCH Computer Architecture News
... text processing applications such as UTF-8 to UTF-16 transcoding, XML parsing, string search and regular expression ...
Tópico(s): Advanced Data Storage Technologies
2009 - Association for Computing Machinery | ACM SIGPLAN Notices
... and encoding principles (e.g., UTF-8 vs. UTF-16) of ISO 10646, and finally, it focuses on ...
Tópico(s): Natural Language Processing Techniques
2013 - Association for Computational Linguistics | Computational Linguistics
... of UTF‐S is better than that of UTF‐16 and UTF‐8 and is close to that ...
Tópico(s): Particle accelerators and beam dynamics
2001 - Wiley | Software Practice and Experience
... while GNU-strings fails in finding these in UTF-16 and other encodings. During the case study it ...
Tópico(s): Risk and Safety Analysis
2019 - Association of Digital Forensics, Security and Law | The journal of digital forensics, security and law
... with n-qubit QPP any text file in UTF-16 format or any image file in .png format. ...
Tópico(s): Cryptography and Data Security
2024 - Springer International Publishing | Lecture notes on data engineering and communications technologies