Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,999,154 papers from all fields of science
Search
Sign In
Create Free Account
Card security code
Known as:
CVC1
, CVC2
, Card Verification Code
Expand
A card security code (CSC; also called card verification data (CVD), card verification number, card verification value (CVV), card verification value…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Chargeback
Contactless payment
Credit card fraud
E-commerce
Expand
Broader (1)
Merchant services
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2009
Review
2009
Internal and external influences on child language productions
Yvan Rose
2009
Corpus ID: 51468313
Over the past three decades, statistical approaches have been successfully used to explain how young language learners…
Expand
Highly Cited
2007
Highly Cited
2007
Phonological Awareness, Letter Knowledge, and Literacy Development in Indonesian Beginner Readers and Spellers.
Heather Winskel
,
V. Widjaja
2007
Corpus ID: 31548944
The aim of the present study was to investigate the grain size predominantly used by children learning to read and spell in…
Expand
2007
2007
Intra-dynastic and Inter-Tai Conflicts in the Old Kingdom of Moeng Lü in Southern Yunnan 1
Foon Ming Liew-Herres
2007
Corpus ID: 130278342
Power struggles within ruling houses are a classic problem causing the weakening of dynasties and inviting foreign invasions. The…
Expand
Highly Cited
2005
Highly Cited
2005
A Real-Time Negotiation Model and A Multi-Agent Sensor Network Implementation
Leen-Kiat Soh
,
C. Tsatsoulis
Autonomous Agents and Multi-Agent Systems
2005
Corpus ID: 11003371
This paper describes a negotiation model that incorporates real-time issues for autonomous agents. This model consists of two…
Expand
2005
2005
Enhanced wavelet correlogram methods for image indexing and retrieval
M. S. Tarzjan
,
H. Moghaddam
IEEE International Conference on Image Processing
2005
Corpus ID: 2548145
In this paper, three new algorithms including optimal quantized wavelet correlogram (OQWC), wavelet CCV-correlogram (W3C), and…
Expand
Highly Cited
1999
Highly Cited
1999
Design of in-pipe inspection vehicles for /spl phi/25, /spl phi/50, /spl phi/150 pipes
S. Hirose
,
H. Ohno
,
T. Mitsui
,
K. Suyama
Proceedings IEEE International Conference on…
1999
Corpus ID: 5836223
In this paper we outline the design of in-pipe inspection vehicle for pipes with diameters of /spl phi/25, /spl phi/50 and /spl…
Expand
1998
1998
Signal recognition and signature code acquisition in CDMA mobile packet communications
R. D. Gaudenzi
,
F. Giannetti
,
M. Luise
1998
Corpus ID: 16070497
Fast and reliable signal sense and signature code synchronization for direct-sequence spread-spectrum (DS-SS) signals are key…
Expand
1996
1996
Production and shedding of channel catfish virus (CCV) and thymidine kinase negative CCV in immersion exposed channel catfish fingerlings
S. R. Kancharla
,
L. Hanson
1996
Corpus ID: 54092305
The progression of channel catfish virus (CCV) and thymidine kinase negative recombinant CCV (CCVTK-) infections in immersion…
Expand
1991
1991
NEW SIGNATURE CODE SEQUENCE DESIGN TECHNIQUES FOR CDMA SYSTEMS
Timothy O’Farrell
1991
Corpus ID: 62091157
New design techniques are presented for carefully selecting subsets of signature code sequences with small crosscorrelation…
Expand
Review
1986
Review
1986
X-ray spectra and the rotation-activity connection of RS Canum Venaticorum binaries
P. Majer
,
J. Schmitt
,
L. Golub
,
F. R. Harnden
,
R. Rosner
1986
Corpus ID: 109933367
Results are presented from a survey of RS CVn binaries which were observed with the imaging proportional counter (IPC) on board…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE