Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,974,874 papers from all fields of science
Search
Sign In
Create Free Account
Add-ons for Firefox
Known as:
Extension (Mozilla)
, Firefox Add-ons
, Update.mozilla.org
Expand
Mozilla add-ons are installable enhancements to the Mozilla Foundation's projects, including Firefox, Thunderbird, SeaMonkey, and Sunbird. Add-ons…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adobe Flash Player
Browser extension
Cascading Style Sheets
ChatZilla
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A Semiautomatic Extraction of Antarctic Lake Features Using Worldview-2 Imagery
S. Jawak
,
A. J. Luis
2014
Corpus ID: 54516948
We devised a semiautomatic approach for extracting lake features based on a customized set of normalized difference water index…
Expand
2012
2012
Design strategy for optimizing power consumption of sensor node with Min(N,T) policy M/G/1 queuing models
Fuu-Cheng Jiang
,
Der-Chen Huang
,
Chao-Tung Yang
,
Chu-Hsing Lin
,
Kuo-Hsiung Wang
International Journal of Communication Systems
2012
Corpus ID: 13105877
Energy saving is an important issue in wireless sensor networks for majority of sensor nodes equipped with non‐rechargeable…
Expand
2009
2009
Benefits and Risks of Combination Therapy for Hepatitis
N. Terrault
2009
Corpus ID: 27828729
In successful antiviral therapy of hepatitis B, drug combinations, particularly combinations without cross-resistance, can delay…
Expand
2007
2007
Analysis of Handoff Performance in Mobile WiMAX Networks
R. Jäntti
,
M. Peuhkuri
,
Antti Mäkeläinen
,
Teknillinen Korkeakoulu
,
Diplomityön Tiivistelmä
2007
Corpus ID: 15630467
This thesis introduces a new 802.16e-2005 amendment to the 802.16-2004 standard, generally known as WiMAX. The 802.16e-2005, or…
Expand
2003
2003
How trustworthy is trusted computing?
S. Vaughan-Nichols
Computer
2003
Corpus ID: 18159829
One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are…
Expand
Review
2002
Review
2002
Robust two degree-of-freedom add-on controller design for automatic steering
B. A. Güvenç
,
L. Guvenç
IEEE Transactions on Control Systems Technology
2002
Corpus ID: 28692336
A robust 2-DOF add-on controller design based on the disturbance observer is presented in this paper for improved performance in…
Expand
1999
1999
Common information model-a developer's perspective
R. Podmore
,
D. Becker
,
R. Fairchild
,
M. Robinson
Proceedings of the 32nd Annual Hawaii…
1999
Corpus ID: 24177919
The Common Information Model (CIM) defines a utility industry standard object-model for the development and integration of…
Expand
1998
1998
Power conditions and control of a regenerative brake
V. Blasko
,
Rockwell
,
A. Bradley
Conference Record of IEEE Industry Applications…
1998
Corpus ID: 16026398
Braking capability is typically accomplished by adding a dynamic/resistive brake (DB) module to a standard drive. Regenerating…
Expand
1992
1992
Graft polymerization of cationic methacrylate, acrylamide, and acrylonitrile monomers onto starch by reactive extrusion
M. Carr
,
S. Kim
,
K. Yoon
,
K. Stanley
1992
Corpus ID: 100494804
Starch graft copolymers were prepared from cationic methacrylate (CM), acrylamide (AAm), and acrylonitrile (AN) monomers by…
Expand
1991
1991
Workstation Support for Time-Critical Applications
James G. Hanko
,
Eugene M. Kuerner
,
J. Northcutt
,
Gerard A. Wall
International Workshop on Network and Operating…
1991
Corpus ID: 9011586
Current workstations have a great deal of computational power. However, this power cannot be effectively delivered to support…
Expand