Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,206,033 papers from all fields of science
Search
Sign In
Create Free Account
Do Not Distribute, Transfer, Loan, or Sell Product
The healthcare provider or setting must not distribute, transfer, loan, or sell the product.
National Institutes of Health
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Optical properties of Si/SiO2 and GaAs/AlOx sub-wavelength HCG mirrors on GaAs substrate and an impact of structural imperfections on their performance
M. Gȩbski
,
M. Dems
,
Jing Chen
,
W. Qijie
,
Z. D. Hua
,
T. Czyszanowski
IEEE International Nanoelectronics Conference
2013
Corpus ID: 5680319
In order to obtain low threshold VCSELs high reflectivity mirrors are crucial in their designs. Typically used Distribute Bragg…
Expand
Review
2013
Review
2013
The effect and mediating mechanism of organizational injustice on destructive leadership: Empirical research in China
Li Cheng-feng
,
Ge Jing-jing
,
Meng Yan
,
Tian Ye-zhuang
International Conference on Management Science…
2013
Corpus ID: 10137764
This research investigated the effects of distribute injustice and interpersonal injustice leaders perceived on destructive…
Expand
Review
2012
Review
2012
Credit Cooperatives: Challenges and Opportunities in the Global Scenario
G. Ferri
2012
Corpus ID: 59359199
The future scenario highlights a Western leadership challenged while the geo-economy seems to be moving back to a pre-Industrial…
Expand
2010
2010
A packet classification's algorithm
Thapana Choorat
,
A. Khunkitti
International Conference on Computer and…
2010
Corpus ID: 21454637
Now, internet is a very large size network. The internet is a packet switched network offers best-effort service, not guarantee…
Expand
2009
2009
Analysis and design of distributed firewall system in campus network
L. Xiaofei
IEEE Pacific-Asia Workshop on Computational…
2009
Corpus ID: 18786275
This paper first introduces network security and the conventional firewall technology and points out the problems that the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE