Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,270,910 papers from all fields of science
Search
Sign In
Create Free Account
Home page
Known as:
HomePage.
, Home Page Home Page
, Homepage definition
Expand
(Not to be confused with home screen.)(For other uses, see Home page (disambiguation).) ("Start page" redirects here. For the search engine, see…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Contact page
Criticism of Facebook
Deep linking
Dynamic web page
Expand
Broader (2)
Web design
World Wide Web
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Biodegradation of the herbicide mecoprop-p with soil depth and its relationship with class III tfdA genes
M. S. Rodríguez-Cruz
,
J. Bælum
,
+5 authors
G. Bending
2010
Corpus ID: 51827442
Review
2008
Review
2008
Peer-to-Peer Streaming Technology Survey
J. Peltotalo
,
J. Harju
,
Alex Jantunen
,
M. Saukko
,
Lassi Väätämöinen
Information-Centric Networking
2008
Corpus ID: 8037885
Lately there has been a growing interest in the use of peer-to-peer technologies for deploying large-scale live media streaming…
Expand
2007
2007
Larval feeding behavior and ant association in frosted elfin, Callophrys irus (Lycaenidae)
G. Albanese
,
M. W. Nelson
,
P. Vickery
,
P. Sievert
2007
Corpus ID: 17620862
Callophrys irus is a rare and declining lycaenid found in the eastern U.S., inhabiting xeric and open habitats maintained by…
Expand
2006
2006
Quark-gluon vertex dressing and meson masses beyond ladder-rainbow truncation
H. Matevosyan
,
A. Thomas
,
P. Tandy
2006
Corpus ID: 54809752
We include a generalized infinite class of quark-gluon vertex dressing diagrams in a study of how dynamics beyond the ladder…
Expand
2005
2005
Battling Terrorism: Legal Perspectives on the use of Force and the War on Terror
J. Maogoto
2005
Corpus ID: 152891329
Contents: Introduction The development of the law relating to the use of force in international law Countering terrorism: an…
Expand
2004
2004
Conjectures and Manipulations. Computational Modeling and the Extra- Theoretical Dimension of Scientific Discovery
L. Magnani
Minds and Machines
2004
Corpus ID: 37767092
Computational philosophy (CP) aims at investigating many important concepts and problems of the philosophical and epistemological…
Expand
Highly Cited
2000
Highly Cited
2000
On effective multi-dimensional indexing for strings
H. V. Jagadish
,
Nick Koudas
,
D. Srivastava
ACM SIGMOD Conference
2000
Corpus ID: 6186629
As databases have expanded in scope from storing purely business data to include XML documents, product catalogs, e-mail messages…
Expand
2000
2000
Law Libraries in Hyperspace: A Citation Analysis of World Wide Web Sites
Robert C. Vreeland
2000
Corpus ID: 141390848
Mr. Vreeland suggests the use of citation analysis as an appropriate objective standard for measuring and evaluating law library…
Expand
1997
1997
A reliable hardware barrier synchronization scheme
Rajeev Sivaram
,
C. Stunkel
,
D. Panda
Proceedings 11th International Parallel…
1997
Corpus ID: 7242187
Barrier synchronization is a crucial operation for parallel systems. Many schemes have been proposed in the literature to achieve…
Expand
1997
1997
Applying Mobile Code to Distributed Systems
David Halls
1997
Corpus ID: 53909962
Use of mobile code can make distributed systems and the abstractions they provide more exible to build and use. Richer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE