CWI-2

Known as: CWI encoding, HU8CWI2, Oracle HU8CWI2 
CWI-2 (aka CWI, cp-hu, HUCWI, or HU8CWI2) is a Hungarian code page frequently used in the 1980s and early 1990s. If this code page is erroneously… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1984-2017
0204019842017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
The workhorse and focal point for our research is MonetDB, an open-source columnar database system. Its development goes back as… (More)
Is this relevant?
2011
2011
We report on the participation of the Interactive Information Access group of the CWI Amsterdam in the web, session, and medical… (More)
  • table 1
  • table 3
  • table 2
  • table 4
  • figure 1
Is this relevant?
2009
2009
CWI’s experiments investigate the usefulness of clickthrough data for improving the diversity of image retrieval results. We use… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
2008
2008
PF/Tijah is a research prototype created by the University of Twente and CWI Amsterdam with the goal to create a flexible… (More)
  • table 1
  • figure 1
Is this relevant?
2002
2002
We present a probabilistic model for the retrieval of multimodal documents. The model is based on Bayesian decision theory and… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2002
2002
With explosive growth of e-Business on the Internet, and wireless networks, users face more and more challenging networks-based… (More)
Is this relevant?
2001
2001
This paper will concentrate on contributions of CWI to the development of parallel Runge-Kutta (RK) methods. We shall describe… (More)
  • figure 2.1
  • table 2.1
  • table 3.2
  • table 3.1
  • table 4.1
Is this relevant?
1998
1998
1. ABSTRACT This paper destibes document modetig consticts that support dtemate content &oices for genera~ied hypermedia… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1987
Highly Cited
1987
In a paper published in 1978 (Needham & Schroeder) we presented protocols for the use of encryption for authentication in large… (More)
Is this relevant?
1984
1984
Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?