Skip to search formSkip to main contentSkip to account menu

Common Vulnerabilities and Exposures

Known as: CAN Number, CVE number, CVE ID 
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2004
2004
Event management must balance consistency and responsiveness above the requirements of shared object interaction within a… 
2002
2002
In order to examine the biological effects of tributyltin (TBT) exposure, the caprellid amphipod Caprella danilevskii was exposed… 
2001
2001
We present an interaction model enabling data-source probes and action-based gauges to communicate using an intelligent event… 
2000
2000
Hydromedion sparsutum is a locally abundant herbivorous beetle on the sub-Antarctic island of South Georgia, often living in… 
2000
2000
Collaborative Virtual Environment concepts have been used in many systems in the past few years. Applications of such technology… 
1997
1997
Changes in cytosolic and vacuolar pH, ATP, ADP, and the ATP:ADP ratio were measured in whole fruit or mesocarp disks of avocado… 
1993
1993
Abstract This paper describes the architecture of cooperative visual environments (CVE). This proposal stems from the findings of… 
1985
1985
This paper discusses extensive radiation damage measurements that were made on unprotected, radiation-soft, p-channel MOS…