نتایج جستجو برای: ascii

تعداد نتایج: 1634  

Journal: :RFC 2003
Adam M. Costello

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Punycode is a simple and efficie...

2008
Paul D. O’Grady Scott T. Rickard

It is hard to avoid ASCII Art in today’s digital world, from the ubiquitous emoticons—;)—to the esoteric artistic creations that reside in many people’s e-mail signatures, everybody has come across ASCII art at some stage. The origins of ASCII art can be traced back to the days when computers had a high price, slow operating speeds and limited graphics capabilities, which forced computer progra...

2002
Patrik Faltstrom Paul Hoffman Adam M. Costello

Until now, there has been no standard method for domain names to use characters outside the ASCII repertoire. This document defines internationalized domain names (IDNs) and a mechanism called IDNA for handling them in a standard fashion. IDNs use characters drawn from a large repertoire (Unicode), but IDNA allows the non-ASCII characters to be represented using only the ASCII characters alread...

1997
D. A. van Beek J. E. Rooda

Most present day simulation languages use ASCII characters for representation of models. ASCII characters are chosen, because of the requirements of present day computer implementations. In mathematics, on the other hand, symbolic representations are common place, because of better readability. In this article, the χ specification language is presented. The language is used for specification, s...

2013
Prabal Banerjee Asoke Nath

In the present paper the authors have introduced a new symmetric key cryptographic method where they have clubbed both bit level and byte level generalized modified vernam cipher method with feedback. Nath et al already developed methods bit level encryption standard(BLES) Ver-I and Ver-II where they have used extensive bit level permutation, bit exchange, bit xor and bit shift encryption metho...

2012
Joseph Bonneau

Password authentication remains ubiquitous on the web, primarily because of its low cost and compatibility with any device which allows a user to input text. Yet text is not universal. Computers must use a character encoding system to convert human-comprehensible writing into bits. We examine for the first time the lingering effects of character encoding on the password ecosystem. We report a n...

Journal: :RFC 1972
Robert T. Braden

A. INTRODUCTION Under NETRJS [1], CCN's Network rje protocol [2], a virtual remote batch terminal may be either EBCDIC or ASCII. CCN operates an IBM 360/91 which performs all of its normal processing in EBCDIC. When a virtual ASCII terminal signs onto NETRJS, CCN translates the "card reader" stream to EBCDIC and translates the "printer" stream back to ASCII [3]. In recent months, a number of AS...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید