Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,338 papers from all fields of science
Search
Sign In
Create Free Account
Composite Blocking List
Known as:
CBL
In computer networking, the Composite Blocking List (CBL) is a DNS-based Blackhole List of suspected E-mail spam sending computer infections. The CBL…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Botnet
CBL Index
Computer virus
DNSBL
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The Brassica napus Calcineurin B-Lik 1 / CBL-interacting protein kinase 6 ( CBL 1 / CIPK 6 ) component is involved in the plant response to abiotic stress and ABA signalling
M. Greco
,
L. Bruno
,
M. B. Bitonti
2012
Corpus ID: 88508441
In mammals, cadmium is widely considered as a non-genotoxic carcinogen acting through a methylation-dependent epigenetic…
Expand
2010
2010
Mutations of E3 ubiquitin ligase Cbl family members but not TET2 mutations are pathogenic in juvenile myelomonocytic leukemia
村松 秀城
2010
Corpus ID: 82664875
Highly Cited
2008
Highly Cited
2008
Realization of High Voltage ($≫ \hbox{700}$ V) in New SOI Devices With a Compound Buried Layer
X. Luo
,
Zhaoji Li
,
+7 authors
Bin Yan
IEEE Electron Device Letters
2008
Corpus ID: 10799127
A novel silicon-on-insulator (SOI) high-voltage device with a compound buried layer (CBL SOI) consisting of two oxide layers and…
Expand
2005
2005
3D CBL: An Efficient Algorithm for General 3-Dimensional Packing Problems *
Yuchun Ma
,
Xianlong Hong
,
Sheqin Dong
2005
Corpus ID: 123940184
The 3-D packing problem is important for practical applications. In the field of VLSI design, 3-D packing arises from both the…
Expand
Review
1998
Review
1998
An investigation of the potential for a computer-based tutorial program covering the cardiovascular system to replace traditional lectures
D. Dewhurst
,
Alan Williams
Comput. Educ.
1998
Corpus ID: 21630473
1998
1998
WIND TUNNEL MODEL STUDY OF TURBULENCE REGIME IN THE ATMOSPHERIC CONVECTIVE BOUNDARY LAYER
E. Fedorovich
,
R. Kaiser
1998
Corpus ID: 7194136
Results from a wind tunnel model of the sheared atmospheric convective boundary layer (CBL) are presented and discussed. The…
Expand
Review
1998
Review
1998
Beyond the media: knowledge level interaction and guided integration for CBL systems
Andrew Ravenscroft
,
K. Tait
,
I. Hughes
Comput. Educ.
1998
Corpus ID: 1631277
1998
1998
Replacing lectures with multimedia CBL: Student attitudes and reactions
K. Tait
1998
Corpus ID: 60493595
The lectures for two modules which together comprise an introductory course on textiles and textile manufacturing comprising some…
Expand
Highly Cited
1997
Highly Cited
1997
Post global routing crosstalk synthesis
T. Xue
,
E. Kuh
,
Dongsheng Wang
IEEE Trans. Comput. Aided Des. Integr. Circuits…
1997
Corpus ID: 2237196
For the generation of a risk-free layout solution of a chip, crosstalk synthesis should be pursued at various stages in the…
Expand
1957
1957
Die Rolle des Waldhonigtaus im Nahrungshaushalt forstlich nützlicher Insekten
G. Zoebelein
Forstwissenschaftliches Centralblatt ()
1957
Corpus ID: 34177450
1. BussE: Forstw. Cbl., 1910, S. 74. 2. CASVARY: Bot. Ztg., 1855, 13, S. 449. 3. CASVA~Y: Bot. Ztg., 1857, 15, S. 329. 4. G6WERT…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE