Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,465,325 papers from all fields of science
Search
Sign In
Create Free Account
Common Vulnerabilities and Exposures
Known as:
CAN Number
, CVE number
, CVE ID
Expand
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Adobe Flash
Attack (computing)
Attack patterns
Blinding (cryptography)
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures
Qiuyuan Chen
,
Lingfeng Bao
,
Li Li
,
Xin Xia
,
Liang Cai
Asia-Pacific Software Engineering Conference
2018
Corpus ID: 53404757
To share vulnerability information across separate databases, tools, and services, newly identified vulnerabilities are…
Expand
Highly Cited
2015
Highly Cited
2015
A realtime curvature-smooth interpolation scheme and motion planning for CNC machining of short line segments
Wei Fan
,
Chen-Han Lee
,
Jihong Chen
2015
Corpus ID: 60843316
Highly Cited
2014
Highly Cited
2014
Why does cryptographic software fail?: a case study and open problems
David Lazar
,
Haogang Chen
,
Xi Wang
,
Nickolai Zeldovich
Asia Pacific Workshop on Systems
2014
Corpus ID: 459254
Mistakes in cryptographic software implementations often undermine the strong security guarantees offered by cryptography. This…
Expand
Highly Cited
2014
Highly Cited
2014
Automatic runtime error repair and containment via recovery shepherding
Fan Long
,
Stelios Sidiroglou
,
M. Rinard
ACM-SIGPLAN Symposium on Programming Language…
2014
Corpus ID: 6252501
We present a system, RCV, for enabling software applications to survive divide-by-zero and null-dereference errors. RCV operates…
Expand
Highly Cited
2012
Highly Cited
2012
(Non)-renormalization of the chiral vortical effect coefficient
Siavash Golkar
,
D. Son
2012
Corpus ID: 10557327
A bstractWe show using diagramtic arguments that in some (but not all) cases, the temperature dependent part of the chiral…
Expand
Highly Cited
2005
Highly Cited
2005
Collaborative Virtual Environment Technology for People With Autism
Yufang Cheng
,
D. Moore
,
P. McGrath
,
Yulei Fan
International Conference on Advanced Learning…
2005
Corpus ID: 7636607
Collaborative virtual environments (CVEs) hold great potential for people With autism. An exploratory empirical study Was…
Expand
Highly Cited
2003
Highly Cited
2003
Constructing a Gazebo: Supporting Teamwork in a Tightly Coupled, Distributed Task in Virtual Reality
D. Roberts
,
R. Wolff
,
Oliver Otto
,
A. Steed
Presence: Teleoperators & Virtual Environments
2003
Corpus ID: 18441588
Many tasks require teamwork. Team members may work concurrently, but there must be some occasions of coming together…
Expand
Review
2003
Review
2003
Systematic Usability Evaluation and Design Issues for Collaborative Virtual Environments
J. Tromp
,
A. Steed
,
John R. Wilson
Presence: Teleoperators & Virtual Environments
2003
Corpus ID: 38211080
This paper presents results of the longitudinal usability and network trials that took place throughout the COVEN (COllaborative…
Expand
Review
1994
Review
1994
Responses of soil biota to elevated atmospheric carbon dioxide
E. O'neill
Plant and Soil
1994
Corpus ID: 19587665
Increasing concentrations of atmospheric CO2 could have dramatic effects upon terrestrial ecosystems including changes in…
Expand
Review
1985
Review
1985
Surgical Exposures in Orthopaedics: The Anatomic Approach
F. Sim
1985
Corpus ID: 71261886
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE