Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,207 papers from all fields of science
Search
Sign In
Create Free Account
Signedness
Known as:
Unsigned integers
, Unsigned (arithmetic)
, Signed byte
Expand
In computing, signedness is a property of data types representing numbers in computer programs. A numeric variable is signed if it can represent both…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
16-bit
32-bit
Action!
Binary multiplier
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Auto-correction of English to Bengali Transliteration System using Levenshtein Distance
M. Hossain
,
Md. Farhan Labib
,
A. Rifat
,
A. Das
,
Monira Mukta
7th International Conference on Smart Computing…
2019
Corpus ID: 202701092
The automated transliteration process is a function or software application that checks words against a computerized corpus to…
Expand
2016
2016
Optimum message mapping LDPC decoders derived from the sum-product algorithm
J. Lewandowsky
,
Maximilian Stark
,
G. Bauch
IEEE International Conference on Communications…
2016
Corpus ID: 35302229
Starting from a discrete density evolution scheme originally introduced by Brian M. Kurkoski et al. which we improved by applying…
Expand
2016
2016
A massively parallel pipelined reconfigurable design for M-PLN based neural networks for efficient image classification
N. Nedjah
,
Felipe P. da Silva
,
Alan Oliveira de Sá
,
L. M. Mourelle
,
Diana A. Bonilla
Neurocomputing
2016
Corpus ID: 134459
2015
2015
Fast LZW Compression Using a GPU
Shunji Funasaka
,
K. Nakano
,
Yasuaki Ito
International Symposium on Computing and…
2015
Corpus ID: 11105091
The LZW compression is a well known patented lossless compression method used in Unix file compression utility "compress" and in…
Expand
2015
2015
Trellis based node operations for LDPC decoders from the Information Bottleneck method
J. Lewandowsky
,
G. Bauch
International Conference on Signal Processing and…
2015
Corpus ID: 6867827
We utilize the Information Bottleneck method in a discrete density evolution scheme that was introduced by Brian M. Kurkoski et…
Expand
2009
2009
Mutation-Based Testing of Integer Overflow Vulnerabilities
Fanping Zeng
,
Liangliang Mao
,
Zhide Chen
,
Qing Cao
International Conference on Wireless…
2009
Corpus ID: 6137527
Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer…
Expand
2002
2002
Instruction set extension for long integer modulo arithmetic on RISC-based smart cards
J. Grossschadl
Symposium on Computer Architecture and High…
2002
Corpus ID: 195715175
Modulo multiplication of long integers (/spl ges/ 1024 bits) is the major operation of many public-key cryptosystems like RSA or…
Expand
1999
1999
Data processing system and method for performing arith metic operation on plurality of signed data values
W·迪克斯特拉
1999
Corpus ID: 108354357
The method of the present invention is provided a plurality ( 'p' th) with sign "n-bit" data value of the data processing system…
Expand
Review
1976
Review
1976
Theory of Urban Household Automobile-Ownership Decisions
L. Burns
,
T. Golob
,
G. C. Nicolaidis
1976
Corpus ID: 73628519
Automobile-ownership behavior is modeled as a function of socioeconomic factors and the availability and levels of service of…
Expand
1963
1963
Order properties of bounded observables
N. Zierler
1963
Corpus ID: 12495928
Continuing the development [4] of an aspect of the approach to the axiomatization of quantum mechanics of G. W. Mackey [3], we…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE