Canonical account

Known as: Built-in, Built-in account, Canonical password 
A canonical account (or built-in account), in the context of computer software and systems, is an account that is included by default with a program… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
SUMMARY De novo assembly tools play a main role in reconstructing genomes from next-generation sequencing (NGS) data and usually… (More)
  • table 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Random community genomes (metagenomes) are now commonly used to study microbes in different environments. Over the past few years… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Community structure is one of the most important features of real networks and reveals the internal organization of the nodes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
As both technologies and organizations undergo dramatic changes in form and function, organizational researchers are increasingly… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Based on a rigorous analysis of existing workflow management systems and workflow languages, a new workflow language is proposed… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Intrinsically unstructured/disordered proteins and domains (IUPs) lack a well-defined three-dimensional structure under native… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Logic programming with the stable model semantics is put forward as a novel constraint programming paradigm. This paradigm is… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We apply coset codes to adaptive modulation in fading channels. Adaptive modulation is a powerful technique to improve the energy… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?