Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,780,525 papers from all fields of science
Search
Sign In
Create Free Account
Criticism of Microsoft
Known as:
Criticisms of microsoft
, Anti-Microsoft
, Microsoft censorship in China
Expand
Criticism of Microsoft has followed various aspects of its products and business practices. Issues with ease of use, robustness, and security of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Active Directory
Altair BASIC
Application programming interface
C++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Performance analysis of microsoft network policy server and freeRADIUS authentication systems in 802.1x based secured wired ethernet using PEAP
Farrukh Chughtai
,
R. Amin
,
A. Malik
,
Nausheen Saeed
˜The œinternational Arab journal of information…
2019
Corpus ID: 201836055
IEEE 802.1x is an industry standard to implement physical port level security in wired and wireless Ethernets by using RADIUS…
Expand
2019
2019
Avatud lähtekoodiga vahendite kohandamine Microsoft Visual C++ tarkvaralahenduste kvaliteedi analüüsiks SonarQube serveris.Adapting Open Source Tools for Code Quality Analysis of Microsoft Visual C…
Juhan-Peep Ernits
2019
Corpus ID: 209083440
2015
2015
Analysis of microsoft kinect depth perception for distance detection of vehicles
M. S. Abdullah
,
A. Zabidi
,
I. Yassin
,
H. Hassan
Control and System Graduate Research Colloquium
2015
Corpus ID: 20204468
The Microsoft Kinect device is capable to perform object detection using its advanced depth sensors. In this project, the Kinect…
Expand
2010
2010
Electrochemical Machining of Tungsten Carbide Microshaft
K. Lee
2010
Corpus ID: 137682869
Tungsten carbide microshaft is used as micro punch, electrode of micro electro discharge machining, and micro tool because of its…
Expand
Review
2007
Review
2007
Should Finland Introduce an R&D Tax Credit? Reflections Based on Norwegian R&D Tax Policy
Jarle Møen
2007
Corpus ID: 86861331
Subsidies to commercial R&D can be given as R&D tax credits or through direct grants. Tax incentives have become an increasingly…
Expand
Review
2006
Review
2006
Cultural Evaluations of Risk: 'Values' or 'Blunders'?
D. Kahan
,
P. Slovic
2006
Corpus ID: 143236725
The phenomenon of cultural cognition refers to the disposition of individuals to adopt factual beliefs about risk that express…
Expand
2006
2006
Defying Bureaucratic Malfeasance: The IMF’s Push for Good Governance
Ryan S. Cadry
2006
Corpus ID: 20794066
F a c u l t y M e n t o r
2004
2004
Threat Modelling for ASP.NET - Designing Secure Applications
Rüidiger Grimm
,
Henrik Eichstädt
Communications and Multimedia Security
2004
Corpus ID: 27475120
This paper gives a security analysis of Microsoft's ASP.NET technology. The main part of the paper is a list of threats which is…
Expand
Review
2002
Review
2002
Bernard Gert's Morality and its application to computer ethics
Timm Triplett
Ethics and Information Technology
2002
Corpus ID: 26584035
Bernard Gert’s account of the moral system is at once modest and bold, traditional and original. It is modest and traditional…
Expand
1998
1998
A user-centred approach to the design of an expert system for training
M. A. Borges
,
M. Baranauskas
British Journal of Educational Technology
1998
Corpus ID: 15074952
This paper reports the objectives, design approach and first results of a research project that aims to develop an intelligent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE