Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

CP/M

Known as: CP/M BIOS, CPM, CP/M 3.0 
CP/M, originally standing for Control Program/Monitor (Kernel/Console) and later Control Program for Microcomputers, is a mass-market operating… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We examine how entrepreneurs shape organizational boundaries and construct markets through an inductive, longitudinal study of… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Coloured Petri Nets (CPNs) is a language for the modelling and validation of systems in which concurrency, communication, and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, we present a longitudinal study of organizational responses to environmental changes that induce members to… Expand
  • table 1
  • table 2
  • table 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Summary Decentralization initiatives have been launched in the majority of developing countries, but these rarely lay the… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Marchenko, A. A., and Pastur, L. A. (1967), “Distribution of Eigenvalues for Some Sets of Random Matrices,” Mathematics of the… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
From the Publisher: Artificial "neural networks" are now widely used as flexible models for regression classification… Expand
Is this relevant?
Highly Cited
1992
Highly Cited
1992
This paper presents the results of an experiment which investigated elementary school children's conceptual knowledge about the… Expand
  • figure 1
  • table 2
  • table 4
  • table 5
Is this relevant?
Highly Cited
1989
Highly Cited
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the… Expand
Is this relevant?