Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,560,446 papers from all fields of science
Search
Sign In
Create Free Account
Information science
Known as:
Information Studies
, Infosci
, Information Sciences
Expand
Information science is an interdisciplinary field primarily concerned with the analysis, collection, classification, manipulation, storage, retrieval…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Categorization
Cognitive science
Computational biology
CyberGIS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2007
Review
2007
Concordancing the web: promise and problems, tools and techniques
William H. Fletcher
2007
Corpus ID: 60699329
The web is an inexhaustible reservoir of machine-readable texts in most of the world’s written languages for compiling corpora or…
Expand
2007
2007
A seamless context-aware architecture for fourth generation wireless networks
A. Hasswa
,
N. Nasser
,
H. Hassanein
Wireless personal communications
2007
Corpus ID: 1903259
The integration of a multitude of wireless networks is expected to lead to the emergence of the fourth generation (4G) of…
Expand
Highly Cited
2005
Highly Cited
2005
Comparison of Random-Dopant-Induced Threshold Voltage Fluctuation in Nanoscale Single-, Double-, and Surrounding-Gate Field-Effect Transistors
Yiming Li
,
Shao-Ming Yu
2005
Corpus ID: 108690121
In this study, we explore random-dopant-induced threshold voltage fluctuation by solving a quantum correction model. Fluctuation…
Expand
Highly Cited
2004
Highly Cited
2004
Architecture design of grid GIS and its applications on image processing based on LAN
Zhanfeng Shen
,
Jiancheng Luo
,
+5 authors
Qinghui Sun
Information Sciences
2004
Corpus ID: 224355
Highly Cited
2001
Highly Cited
2001
Mean-quantization-based fragile watermarking for image authentication
Gwo-Jong Yu
,
Chun-Shien Lu
,
H. M. Liao
2001
Corpus ID: 9184700
The authors propose an image authentication scheme, which is able to detect malicious tampering while tolerating some incidental…
Expand
Highly Cited
1998
Highly Cited
1998
Doctorate recipients from united states universities: summary report 1998
Allen R. Sanderson
,
B. Dugoni
1998
Corpus ID: 153938120
Doctorates by Race/Ethnicity Following the new Federal standards established for the 2000 decennial census of the U.S. population…
Expand
Highly Cited
1994
Highly Cited
1994
A hybrid algorithm for finding the global minimum of error function of neural networks and its applications
N. Baba
,
Y. Mogami
,
Motokazu Kohzaki
,
Y. Shiraishi
,
Yutaka Yoshida
Neural Networks
1994
Corpus ID: 37941990
Highly Cited
1993
Highly Cited
1993
Performance of ARQ protocols in nonindependent channel errors
Deng-Lin Lu
,
Jin-Fu Chang
IEEE Transactions on Communications
1993
Corpus ID: 39129825
The performance of automatic-repeat-request (ARQ) protocols which are affected by nonindependent channel errors is studied. The…
Expand
Highly Cited
1992
Highly Cited
1992
Impact of consultants on computerization success in small businesses
Charlie P. P. Soh
,
C. Yap
,
K. Raman
Information Manager (The)
1992
Corpus ID: 6689372
Highly Cited
1990
Highly Cited
1990
A Semi-Functional Implementation of a Higher-Order Logic Programming Language
Conal Elliott
,
F. Pfenning
1990
Corpus ID: 54154214
In this chapter we develop an interpreter of a higher-order constraint logic programming language in Standard ML (SML). The logic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required