Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Backward compatibility

Known as: Bugward compatibility, Backwards compatibility, BC 
Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
This is the second edition of Travis Oliphant's A Guide to NumPy originally published electronically in 2006. It is designed to… Expand
  • figure 2.1
  • table 2.1
  • figure 2.2
  • figure 2.3
  • table 3.1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP… Expand
  • figure 1
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The Supersymmetry Les Houches Accord (SLHA) provides a universal set of conventions for conveying spectral and decay information… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Today's data centers may contain tens of thousands of computers with significant aggregate bandwidth requirements. The network… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • I. Ramani, S. Savage
  • Proceedings IEEE 24th Annual Joint Conference of…
  • 2005
  • Corpus ID: 5925786
Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly "hand… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • C. Fehn
  • IS&T/SPIE Electronic Imaging
  • 2004
  • Corpus ID: 62566129
This paper presents details of a system that allows for an evolutionary introduction of depth perception into the existing 2D… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Why did modern economic growth start in the West, and not elsewhere? What was it about England that made it home to… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This… Expand
  • table 1
  • figure 1
  • figure 7
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We propose an enhancement to TCP's error recovery scheme, which we call the Eifel algorithm. It eliminates the retransmission… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We propose two signaling schemes that exploit the availability of multiple (N) antennas at the transmitter to provide diversity… Expand
Is this relevant?