Event (computing)

Known as: Key press, Event model, Keypress 
In computing, an event is an action or occurrence recognized by software that may be handled by the software. Computer events can be generated or… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Attacks that use side channels, such as sound and electromagnetic emanation, to infer keystrokes on physical keyboards are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The Web, teeming as it is with language data, of all manner of varieties and languages, in vast quantity and freely available, is… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Software systems emerge from mere keystrokes to form intricate functional networks connecting many collaborating modules, objects… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Even though they were introduced only a few years ago, peer-to-peer (P2P) filesharing systems are now one of the most popular… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The components of a loosely coupled system are typically designed to operate by generating and responding to asynchronous events… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper presents Scribe, a large-scale event notification infrastructure for topic-based publish-subscribe applications… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper describes the design of <italic>S</italic>IENA, an Internet-scale event notification middleware service for… (More)
  • figure 1
  • figure 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a model for predicting expert text entry rates for several input methods on a 12-key mobile phone keypad. The model… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1990
Highly Cited
1990
The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 8
Is this relevant?