Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 211,141,014 papers from all fields of science
Search
Sign In
Create Free Account
Comment (computer programming)
Known as:
Remmed out
, Source code comments
, */
Expand
In computer programming, a comment is a programmer-readable explanation or annotation in the source code of a computer program. They are added with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASCII art
Abstract data type
AppleScript
Assertion (software development)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
An Integrative Model of Organizational Trust: Past, Present, and Future
F. Schoorman
,
R. Mayer
,
J. H. Davis
2007
Corpus ID: 16917066
A considerable amount of research has examined trust since our 1995 publication. We revisit some of the critical issues that we…
Expand
Review
2004
Review
2004
OWL Web ontology language overview
D. McGuinness
2004
Corpus ID: 60833549
The OWL Web Ontology Language is designed for use by applications that need to process the content of information instead of just…
Expand
Highly Cited
2004
Highly Cited
2004
Character Strengths and Virtues: A Handbook and Classification
C. Peterson
,
M. Seligman
2004
Corpus ID: 143058981
The classification of strengths presented in this book is intended to reclaim the study of character and virtue as legitimate…
Expand
Review
2003
Review
2003
Mechanisms of TGF-β Signaling from Cell Membrane to the Nucleus
Yigong Shi
,
J. Massagué
Cell
2003
Corpus ID: 16860578
Highly Cited
1996
Highly Cited
1996
Exploring the Central Executive
A. Baddeley
1996
Corpus ID: 54633639
The central executive component of working memory is a poorly specified and very powerful system that could be criticized as…
Expand
Highly Cited
1995
Highly Cited
1995
Security Architecture for the Internet Protocol
R. Atkinson
Request for Comments
1995
Corpus ID: 17394064
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services…
Expand
Highly Cited
1993
Highly Cited
1993
An Introduction to Kolmogorov Complexity and Its Applications
Ming Li
,
P. Vitányi
Texts and Monographs in Computer Science
1993
Corpus ID: 27218515
The book is outstanding and admirable in many respects. ... is necessary reading for all kinds of readers from undergraduate…
Expand
Highly Cited
1992
Highly Cited
1992
Matroid theory
J. Oxley
1992
Corpus ID: 8808097
The comments below apply to all printings of the book dated 2005 or earlier. The table following contains more than just a list…
Expand
Review
1990
Review
1990
THE INTERGOVERNMENTAL PANEL ON CLIMATE CHANGE
K. Shine
1990
Corpus ID: 119410238
As part of its commitment to openness and transparency, the IPCC releases drafts that have been submitted for formal expert and…
Expand
Highly Cited
1967
Highly Cited
1967
The Biological Foundations of Language
E. Lenneberg
1967
Corpus ID: 77950237
The coming of language occurs at about the same age in every healthy child throughout the world, strongly supporting the concept…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE