Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,178,521 papers from all fields of science
Search
Sign In
Create Free Account
Ident protocol
Known as:
Identd
, Identification protocol
, Port 113
Expand
The Ident Protocol (Identification Protocol, IDENT), specified in , is an Internet protocol that helps identify the user of a particular TCP…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Common Gateway Interface
Damien Doligez
Email authentication
Gibberish
Expand
Broader (1)
Internet Relay Chat
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Focal plane array detector-based micro-Fourier-transform infrared imaging for the analysis of microplastics in environmental samples
M. Löder
,
M. Kuczera
,
S. Mintenig
,
C. Lorenz
,
G. Gerdts
2015
Corpus ID: 5025190
The pollution of the environment with microplastics (plastic pieces ,5 mm) is a problem of increasing concern. However, although…
Expand
Review
2011
Review
2011
Current progress in DNA barcoding and future implications for entomology
U. Jinbo
,
Toshihide Kato
,
Motomi Ito
2011
Corpus ID: 4633434
DNA barcoding is a technique for identifying organisms based on a short, standardized fragment of genomic DNA. The standardized…
Expand
Highly Cited
2009
Highly Cited
2009
Proofs of Storage from Homomorphic Identification Protocols
G. Ateniese
,
S. Kamara
,
Jonathan Katz
International Conference on the Theory and…
2009
Corpus ID: 18423822
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous…
Expand
Highly Cited
2000
Highly Cited
2000
Collaborative requirements negotiation with EasyWinWin
P. Grünbacher
Proceedings 11th International Workshop on…
2000
Corpus ID: 1200469
The EasyWinWin methodology supports collaborative elaboration, prioritization, and negotiation of system requirements. The…
Expand
Review
1998
Review
1998
Bro: a system for detecting network intruders in real-time
V. Paxson
Comput. Networks
1998
Corpus ID: 215753449
Highly Cited
1995
Highly Cited
1995
Fabrication of two‐dimensional arrays of nanometer‐size clusters with the atomic force microscope
D. Schaefer
,
R. Reifenberger
,
A. Patil
,
R. P. Andres
1995
Corpus ID: 32874525
An atomic force microscope tip is used as a vector positioner to manipulate nanometer‐size preformed Au clusters deposited on…
Expand
1993
1993
PSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation
S. Murer
,
J. Feldman
,
C. Lim
,
M. Seidel
1993
Corpus ID: 59664859
class $DIST{T} is -supertype of all distributed data structures to be used -with the dist-statement nr_of_chunks: INT…
Expand
Highly Cited
1990
Highly Cited
1990
Internal versus external control of reinforcement: A case history of a variable.
J. Rotter
1990
Corpus ID: 41698755
ABSTRACTIn this article the construct of generalized expectancies for internal versus external control of reinforcement is used…
Expand
Highly Cited
1989
Highly Cited
1989
From Critical Resources to Corporate Strategy
B. Wernerfelt
1989
Corpus ID: 168894385
Suppose a new high growth segment opens up in your industry. Should you enter that segment? Many other firms are likely to enter…
Expand
Highly Cited
1989
Highly Cited
1989
Towards a Generic Model of Configuraton Tasks
S. Mittal
,
F. Frayman
International Joint Conference on Artificial…
1989
Corpus ID: 17312712
A precise definition is provided for general configuration tasks. Two important assumptions are identified: (i) functional…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE