Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,066,621 papers from all fields of science
Search
Sign In
Create Free Account
Communication endpoint
Known as:
Endpoint
A communication endpoint is a type of communication network node. It is an interface exposed by a communicating party or by a communication channel…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Computer terminal
End system
Form (HTML)
Group communication system
Expand
Broader (1)
Inter-process communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Understanding Service-Oriented Architecture
David Sprott
2011
Corpus ID: 167117358
It seems probable that eventually most software capabilities will be delivered and consumed as services. Of course they may be…
Expand
Highly Cited
2009
Highly Cited
2009
Linked Sensor Data: RESTfully serving RDF and GML
Kevin R. Page
,
D. D. Roure
,
K. Martinez
,
J. Sadler
,
O. Kit
School on Systems and Networks
2009
Corpus ID: 3330054
Publishing sensor observations on the Linked Data web is the first step in enabling the development of semantic web applications…
Expand
Review
2006
Review
2006
An open label, single-centre, randomized trial of spinal cord stimulation vs. percutaneous myocardial laser revascularization in patients with refractory angina pectoris: the SPiRiT trial: reply
R. Tio
2006
Corpus ID: 5789696
We thank Dr de Vries and colleagues for their comments. In response, we would like to make the following points. First, with…
Expand
2005
2005
Opinion of the Scientific Panel on Food Additives, Flavourings, Processing Aids and Material in Contact with Food (AFC) on a request from the Commission related to Di-Butylphthalate (DBP) for use in…
N. Efsa-Q
2005
Corpus ID: 13717141
Previously, a temporary Tolerable Daily Intake (t-TDI) of 0.05 mg/kg bw was set by the Scientific Committee for Food (SCF), based…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
Highly Cited
1995
Highly Cited
1995
Access Methods for Bi-Temporal Databases
Anil Kumar
,
V. Tsotras
,
C. Faloutsos
Temporal Databases
1995
Corpus ID: 25691754
While much work has recently appeared in literature on access methods for transaction-time databases, not much has been done for…
Expand
Highly Cited
1993
Highly Cited
1993
Design of a high performance haptic interface to virtual environments
P. Millman
,
Michael C. Stanley
,
J. Colgate
Proceedings of IEEE Virtual Reality Annual…
1993
Corpus ID: 32024800
The design of a four degree-of-freedom, force-reflecting manipulandum for manual interaction with virtual environments is…
Expand
Highly Cited
1989
Highly Cited
1989
A strategy for ranking environmentally occurring chemicals
J. Jonsson
,
L. Eriksson
,
M. Sjöström
,
S. Wold
,
M. Tosato
1989
Corpus ID: 53555914
1989
1989
A feedforward decoupling concept for the control of elastic robots
F. Pfeiffer
J. Field Robotics
1989
Corpus ID: 28628542
A reference-oriented procedure for controlling elastic robots is presented. This affords, in a first step, an optimal path…
Expand
Highly Cited
1987
Highly Cited
1987
Feed-forward control strategy for an industrial robot with elastic links and joints
B. Gebler
Proceedings. IEEE International Conference on…
1987
Corpus ID: 44487882
For a lightweight industrial robot the influence of elasticity of joints and links is studied. The manipulator is modeled as a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE