Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Backward compatibility

Known as: Bugward compatibility, Backwards compatibility, BC 
Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The field of machine translation faces an under-recognized problem because of inconsistency in the reporting of scores from its… 
  • table 1
  • table 2
  • figure 1
Highly Cited
2015
Highly Cited
2015
This is the second edition of Travis Oliphant's A Guide to NumPy originally published electronically in 2006. It is designed to… 
  • figure 2.1
  • table 2.1
  • figure 2.2
  • figure 2.3
  • table 3.1
Review
2014
Review
2014
What will 5G be? What it will not be is an incremental advance on 4G. The previous four generations of cellular technology have… 
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Highly Cited
2008
Highly Cited
2008
Today's data centers may contain tens of thousands of computers with significant aggregate bandwidth requirements. The network… 
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Review
2008
Review
2008
Opportunistic unlicensed access to the (temporarily) unused frequency bands across the licensed radio spectrum is currently being… 
  • figure 4
Review
2006
Review
2006
This article describes the gologit2 program for generalized ordered logit models. gologit2 is inspired by Vincent Fu's gologit… 
Highly Cited
2004
Highly Cited
2004
  • C. Fehn
  • IS&T/SPIE Electronic Imaging
  • 2004
  • Corpus ID: 62566129
This paper presents details of a system that allows for an evolutionary introduction of depth perception into the existing 2D… 
Highly Cited
2001
Highly Cited
2001
Why did modern economic growth start in the West, and not elsewhere? What was it about England that made it home to… 
Highly Cited
2001
Highly Cited
2001
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This… 
  • table I
  • figure 1
  • figure 2
  • figure 4
  • figure 6
Highly Cited
2000
Highly Cited
2000
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This… 
  • table 1
  • figure 1
  • figure 7
  • figure 5
  • figure 6