Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

CP/M

Known as: CP/M BIOS, CPM, CP/M 3.0 
CP/M, originally standing for Control Program/Monitor (Kernel/Console) and later Control Program for Microcomputers, is a mass-market operating… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Highly Cited
2006
Highly Cited
2006
In this paper, we present a longitudinal study of organizational responses to environmental changes that induce members to… Expand
  • table 1
  • table 2
  • table 4
Highly Cited
2006
Highly Cited
2006
Summary Decentralization initiatives have been launched in the majority of developing countries, but these rarely lay the… Expand
Highly Cited
2003
Highly Cited
2003
Marchenko, A. A., and Pastur, L. A. (1967), “Distribution of Eigenvalues for Some Sets of Random Matrices,” Mathematics of the… Expand
Highly Cited
2001
Highly Cited
2001
  • 2001
  • Corpus ID: 189798709
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
1995
Highly Cited
1995
From the Publisher: Artificial "neural networks" are now widely used as flexible models for regression classification… Expand
Highly Cited
1992
Highly Cited
1992
This paper presents the results of an experiment which investigated elementary school children's conceptual knowledge about the… Expand
  • figure 1
  • table 2
  • table 4
  • table 5
Review
1990
Review
1990
Predation has long been implicated as a major selective force in the evolution of several morphological and behavioral… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1989
Highly Cited
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the… Expand
Review
1988
Review
1988
Phytoplankton can become limited by the availability of nutrients when light and temperature are adequate and loss rates are not… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3