Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,092 papers from all fields of science
Search
Sign In
Create Free Account
Film-type patterned retarder
Known as:
Film pattern retarder
, Cinema 3D
, FPR
Expand
FPR (Film-type Patterned Retarder) is a technology promoted by LG that is employed in its line of 3D televisions based on circular polarization. It…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
3D television
Anaglyph 3D
Computer monitor
Laptop
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Journal of Enterprise Information Management Use of fuzzy AHP for evaluating the benefits of information-sharing decisions in a supply chain
Selçuk Perçin
,
Cengiz Kahraman
,
U. Cebeci
2015
Corpus ID: 35140221
Purpose – The purpose of this paper is to provide a good insight into the use of fuzzy Analytical Hierarchy Process (fuzzy AHP…
Expand
2015
2015
Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes
L. Sayfullina
,
Emil Eirola
,
+4 authors
J. Karhunen
IEEE Trustcom/BigDataSE/ISPA
2015
Corpus ID: 1204601
According to a recent F-Secure report, 97% of mobile malware is designed for the Android platform which has a growing number of…
Expand
Highly Cited
2013
Highly Cited
2013
An Effective Feature Selection Approach for Network Intrusion Detection
Fengli Zhang
,
Dan Wang
IEEE Eighth International Conference on…
2013
Corpus ID: 9768720
Processing huge amounts of network data is one of the largest challenges for network-based intrusion detection system (IDS…
Expand
2012
2012
Malware target recognition via static heuristics
Thomas E. Dube
,
R. Raines
,
Gilbert L. Peterson
,
K. Bauer
,
M. Grimaila
,
S. Rogers
Computers & security
2012
Corpus ID: 10267243
Highly Cited
2012
Highly Cited
2012
Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features
Gil Tahan
,
L. Rokach
,
Yuval Shahar
Journal of machine learning research
2012
Corpus ID: 15562597
This paper proposes several novel methods, based on machine learning, to detect malware in executable files without any need for…
Expand
2010
2010
On Additive Consistent Properties of the Intuitionistic Fuzzy Preference Relation
Zaiwu Gong
,
Lianshui Li
,
Jie Cao
,
Feixue Zhou
International Journal of Information Technology…
2010
Corpus ID: 10150785
We investigate the properties of additive consistent intuitionistic fuzzy preference relations (IFPR). Usually, consistency in…
Expand
Highly Cited
2005
Highly Cited
2005
Development of 3D detectors featuring columnar electrodes of the same doping type
C. Piemonte
,
M. Boscardin
,
G. Betta
,
S. Ronchin
,
N. Zorzi
2005
Corpus ID: 55785495
2002
2002
Effective Object Segmentation in a Traffic Monitoring Application
A. Bevilacqua
Indian Conference on Computer Vision, Graphics…
2002
Corpus ID: 15003731
The main task of traffic monitoring applications is to identify (and track) moving targets. Thresholding an image resulting from…
Expand
1999
1999
Comparative study for flood detection using JERS-1 SAR and Landsat TM data
S. Takeuchi
,
T. Konishi
,
Y. Suga
,
S. Kishi
IEEE International Geoscience and Remote Sensing…
1999
Corpus ID: 60558501
The authors verified the applicability of spaceborne SAR data for flood detection by the comparative study using JERS-1 SAR and…
Expand
Highly Cited
1998
Highly Cited
1998
Design requirements for SiC/SiC composites structural material in fusion power reactor blankets
L. Giancarli
,
J. Bonal
,
A. Caso
,
G. Le Marois
,
N. Morley
,
J. Salavy
1998
Corpus ID: 23450363
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE