Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,266,003 papers from all fields of science
Search
Sign In
Create Free Account
Extranet
Known as:
Extranets
An extranet is a website that allows controlled access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Ametys CMS
Automotive Network Exchange
Collaborative software
DMZ (computing)
Expand
Broader (1)
Network architecture
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Unsupervised Behavior Evaluation Method in Trustworthy Network
Changping Liu
,
Mingyu Fan
,
Guangwei Wang
Second International Workshop on Education…
2010
Corpus ID: 15120026
Behavior evaluation is an important research topic in trustworthy network. Up to now, most effect focuses on the validity of host…
Expand
2006
2006
IP v6 - An opportunity for new service and network features
M. Tufail
International Conference on Networking and…
2006
Corpus ID: 26359125
As migration to IPv6 in US, driven by the exhaustion of the IPv4 global address pool or by US DoD (Department of Defense) mandate…
Expand
2003
2003
XML Raises Concerns as It Gains Prominence
S. Vaughan-Nichols
Computer
2003
Corpus ID: 28046144
XML's growing implementation has raised several key concerns. First, because they provide considerable information about a…
Expand
Review
2002
Review
2002
Knowledge management for reuse
R. Fruchter
,
P. Demian
2002
Corpus ID: 53654631
Managing and reusing knowledge in architecture, engineering and construction firms can lead to greater competitive advantage…
Expand
2002
2002
Effective knowledge transfer to SMEs Lessons from marketing and knowledge management
R. Arnoud
2002
Corpus ID: 16000441
The responsibility for the contents of this report lies with EIM. Quoting numbers or text in papers, essays and books is…
Expand
2002
2002
Creating corporate advantage through purchasing
V. Weele
,
F. Rozemeijer
2002
Corpus ID: 32480519
Why do many corporate sourcing initiatives fail? In capturing corporate sourcing synergies CPO's need to manage the delicate…
Expand
2001
2001
The Role of Middle Range Publications in the Development of Engineering Knowledge
A. Salter
,
D. Gann
2001
Corpus ID: 11346443
This paper explores the role of publications in the development of engineering knowledge. Previous studies of scientific and…
Expand
2000
2000
Diogenes: A Web Search Agent for Content Based Indexing of Personal Images
Y. Aslandogan
,
Clement T. Yu
Annual International ACM SIGIR Conference on…
2000
Corpus ID: 11013517
Content based indexing of multimedia has always been a challenging task. Especially in webbased retrieval systems, a key…
Expand
2000
2000
An e-education framework for training in the next generation enterprises
L. Motiwalla
Proceedings Academia/Industry Working Conference…
2000
Corpus ID: 41005419
Internet and World Wide Web-based technologies have become a popular platform for the development of distance education (DE…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE