Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,143,986 papers from all fields of science
Search
Sign In
Create Free Account
Chameleon (computing)
Known as:
Chameleon (disambiguation)
Chameleon is a computer workstation design produced at ETH Zurich running the Oberon operating system. It was also the name of an older luggable…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
MS-DOS
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A Chameleon Tongue Inspired Shooting Manipulator With Vision-Based Localization and Preying
Rui Chen
,
Jin-Quan Chen
,
Yi Sun
,
Li Wu
,
Jianglong Guo
IEEE Robotics and Automation Letters
2020
Corpus ID: 220472241
Chameleon tongues are extremely rapid, ultra-stretchable, compact, and can capture preys located multi-directionally. Various…
Expand
2014
2014
First record of Petter's chameleon, Furcifer petteri (Brygoo & Domergue, 1966) from Nosy Be Island, Northwest Madagascar
S. Roberts
,
C. Daly
2014
Corpus ID: 131046220
of the Madagascan offshore islands, boasting at least 80 amphibian and reptile species (Andreone et al., 2003, Glaw and Vences…
Expand
2014
2014
The influences on John Keats : Hellenism, Milton and Shakespeare
Kayleigh Williams
2014
Corpus ID: 162857122
This dissertation focuses on the different influences which shaped and formed John Keats’s poetry and theories on the poetic…
Expand
2012
2012
Chameleon Condos: Critters & Critical Thinking
Ann M Rubino
2012
Corpus ID: 191495781
2009
2009
The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher
M. Saeb
International Conference on Security and…
2009
Corpus ID: 18795979
The Chameleon Cipher-192 is a polymorphic cipher that utilizes a variable word size and variable-size users key. In the…
Expand
2009
2009
Hardware Implementation of The Chameleon Polymorphic Cipher-192
M. Saeb
2009
Corpus ID: 59332093
The Chameleon Cipher-192 is a polymorphic cipher that uses a variable word size and variable-size user’s key. The cipher employs…
Expand
2008
2008
PEMBANGUNAN DSS KESIAPAN TSUNAMI : PEMBANGKIT PETA KELAYAKAN TEMPAT PENGUNGSIAN SECARA ON THE FLY
Surya Afnarius
,
M. Syukur
,
Gusma Yenti
2008
Corpus ID: 140581179
Kota Padang adalah ibu kota propinsi Sumatera Barat berpenduduk hampir 800.000 jiwa berada di pesisir barat pulau Sumatera. Kota…
Expand
2006
2006
Metal fix and power network repair for SOC
Qing K. Zhu
,
P. Kolze
IEEE Computer Society Annual Symposium on VLSI
2006
Corpus ID: 15299443
This paper shows the design flowchart to do metal fix in Chameleon CS2112. CS2112 is an integrated SOC system in one chip with a…
Expand
2001
2001
Comparing fail-silence provided by process duplication versus internal error detection for DHCP server
D. Stott
,
N. Speirs
,
Z. Kalbarczyk
,
S. Bagchi
,
Jun Xu
,
R. Iyer
Proceedings, International Parallel and…
2001
Corpus ID: 13149286
This paper uses fault injection to compare the ability of two fault-tolerant software architectures to protect an application…
Expand
2000
2000
Fault-Injection-Based Assessment of Fail-Silence Provided by Process Duplication versus Internal Error Detection in Scientific-Based Applications
D. Stott
,
N. Speirs
,
+4 authors
R. Iyer
2000
Corpus ID: 13440826
In this paper, two software-based architectures for providing fail-silent processes, Voltan and Chameleon ARMORs, are analyzed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE