Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,724 papers from all fields of science
Search
Sign In
Create Free Account
Guard (information security)
Known as:
Guard
, XML Guard
In information security, a guard is a device or system for allowing computers on otherwise separate networks to communicate, subject to configured…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bastion host
DMZ (computing)
Dual-homed
Email encryption
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Approximation algorithms for art gallery problems in polygons
S. Ghosh
Discrete Applied Mathematics
2010
Corpus ID: 5264868
Highly Cited
2006
Highly Cited
2006
Fundamental tradeoffs in robust spectrum sensing for opportunistic frequency reuse
A. Sahai
,
N. Hoven
,
S. M. Mishra
,
Rahul Tandra
2006
Corpus ID: 14870219
Under the current system of spectrum allocation, spectral bands are allocated for time-scales ranging from years to decades and…
Expand
Highly Cited
2002
Highly Cited
2002
A compositional semantics for UML state machines aimed at performance evaluation
José Merseguer
,
J. Campos
,
Simona Bernardi
,
S. Donatelli
Sixth International Workshop on Discrete Event…
2002
Corpus ID: 14323108
Unified Modeling Language (UML) is gaining acceptance to describe the behaviour of systems. It has attracted the attention of…
Expand
2000
2000
The role of floral oils in the nestmate recognition system of honey bees (Apis mellifera L.)
S. G. Downs
,
F. Ratnieks
,
Sarah L. Jefferies
,
Helen Rigby
2000
Corpus ID: 55510305
Nestmate recognition is essential for maintaining colony integrity in social insects. To dis- criminate between nestmates and non…
Expand
Highly Cited
1995
Highly Cited
1995
A Practical Approach to Programming With Assertions
David S. Rosenblum
IEEE Trans. Software Eng.
1995
Corpus ID: 17372400
Embedded assertions have been recognized as a potentially powerful tool for automatic runtime detection of software faults during…
Expand
Highly Cited
1993
Highly Cited
1993
Male preference for large females and assortative mating for body size in the sand lizard (Lacerta agilis)
M. Olsson
Behavioral Ecology and Sociobiology
1993
Corpus ID: 37769992
SummaryMale sand lizards (Lacerta agilis) are polygynous and guard individual females for several hours to days after copulation…
Expand
Highly Cited
1987
Highly Cited
1987
The guard honey bee: ontogeny and behavioural variability of workers performing a specialized task
A. J. Moore
,
M. Breed
,
Mary Jo Moor
Animal Behaviour
1987
Corpus ID: 53186509
Highly Cited
1983
Highly Cited
1983
An Effective Implementation for the Generalized Input-Output Construct of CSP
Gael N. Buckley
,
A. Silberschatz
TOPL
1983
Corpus ID: 5850600
(1) A C SP program consists of N sequential processes tha t s tar t s imultaneously and terminate when each finishes its last…
Expand
Highly Cited
1978
Highly Cited
1978
Family status and contributions to breeding by Florida scrub jays
Jerre Ann Stallcup
,
G. E. Woolfenden
Animal Behaviour
1978
Corpus ID: 53144305
Highly Cited
1950
Highly Cited
1950
The ramparts we guard
R. Maciver
1950
Corpus ID: 152960082
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE