Skip to search formSkip to main contentSkip to account menu

Common Vulnerabilities and Exposures

Known as: CAN Number, CVE number, CVE ID 
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
In light of the increasingly abundant use of engineered nanoparticles (NPs) and the ongoing exposure to ambient ultrafine… 
2004
2004
Event management must balance consistency and responsiveness above the requirements of shared object interaction within a… 
2004
2004
This paper evaluates the use of Visual Deictic Reference (VDR) in Collaborative Virtual Environments (CVEs). A simple CVE capable… 
2003
2003
Precognitive Habituation (PH) is a phenomenon that has emerged from a search for a straightforward laboratory demonstration of… 
2002
2002
In order to examine the biological effects of tributyltin (TBT) exposure, the caprellid amphipod Caprella danilevskii was exposed… 
2001
2001
We present an interaction model enabling data-source probes and action-based gauges to communicate using an intelligent event… 
2000
2000
Hydromedion sparsutum is a locally abundant herbivorous beetle on the sub-Antarctic island of South Georgia, often living in… 
2000
2000
Collaborative Virtual Environment concepts have been used in many systems in the past few years. Applications of such technology… 
1993
1993
Abstract This paper describes the architecture of cooperative visual environments (CVE). This proposal stems from the findings of…