Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,262,224 papers from all fields of science
Search
Sign In
Create Free Account
Intranet
Known as:
Intra Net
, Internal network
, Private IP network
Expand
An intranet is a private network accessible only to an organization's staff. Generally a wide range of information and services from the organization…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acid2
ActiveMovie
Adobe ColdFusion
Ametys CMS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
Membrane-based biomolecular smart materials
S. A. Sarles
,
D. Leo
2011
Corpus ID: 96423372
Membrane-based biomolecular materials are a new class of smart material that feature networks of artificial lipid bilayers…
Expand
2007
2007
Adaptive mapping to realisation methodology to facilitate mobile initiatives in healthcare
N. Wickramasinghe
,
S. Goldberg
International Journal of Mobile Communications
2007
Corpus ID: 5338304
Facing increasing pressures to embrace new technologies that support grater patient access to and higher quality of but at the…
Expand
2005
2005
A Web-enabled hybrid approach to strategic marketing planning: Group Delphi+a Web-based expert system
Shuliang Li
Expert systems with applications
2005
Corpus ID: 15925045
Highly Cited
2002
Highly Cited
2002
Multicast-based loss inference with missing data
N. Duffield
,
J. Horowitz
,
D. Towsley
,
Wei Wei
,
T. Friedman
IEEE J. Sel. Areas Commun.
2002
Corpus ID: 6673268
Network tomography using multicast probes enables inference of loss characteristics of internal network links from reports of end…
Expand
Highly Cited
2000
Highly Cited
2000
Best practice transfer for future competitiveness: A study of best practices
Y. Jarrar
,
M. Zairi
2000
Corpus ID: 55432639
Benchmarking or best practice management is increasingly being recognized as a powerful performance improvement eVort for…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
1998
1998
It-Enhanced Productivity and Profitability
William R. King
Information systems management
1998
Corpus ID: 32745103
Abstract More than four years ago, the author wrote that, “U.S. businesses have based their investments in IT more on faith than…
Expand
1993
1993
Interfaces for Distributed Systems of Information Servers
B. Kahle
,
H. Morris
,
Jonathan Goldman
,
T. Erickson
,
John Curran
Journal of the American Society for Information…
1993
Corpus ID: 42205410
Interfaces for information access and retrieval are a long way from the ideal of the electronic book that you can cuddle up with…
Expand
Highly Cited
1991
Highly Cited
1991
Controlling congestion in B-ISDN/ATM: issues and strategies
A. E. Eckberg
,
B. Doshi
,
R. Zoccolillo
IEEE Communications Magazine
1991
Corpus ID: 40334287
The high-level goals of a congestion control architecture are outlined. The controls are discussed in detail, focusing on the set…
Expand
1983
1983
State Estimation Based External Network Solution For On-Line Security Analysis
K. Geisler
,
A. Bose
IEEE Transactions on Power Apparatus and Systems
1983
Corpus ID: 27487254
A major difficulty in On-Line Security Analysis of power systems is the representation of the external but interconnected network…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE