Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,213,184 papers from all fields of science
Search
Sign In
Create Free Account
Loader (computing)
Known as:
Load time
, Executable loader
, Program loader
Expand
In computing, a loader is the part of an operating system that is responsible for loading programs and libraries. It is one of the essential stages…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
A-0 System
Assembly language
Booting
Bug compatibility
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
ENHANCED WEB CACHING USING BLOOM FILTER FOR LOCAL AREA NETWORKS
Saravanan
2017
Corpus ID: 212488714
Web caching plays a very important role in improving the speed of web page access and also to reduce the bandwidth usage. In…
Expand
Highly Cited
2015
Highly Cited
2015
HTTP/2-Based Methods to Improve the Live Experience of Adaptive Streaming
Rafael Huysegems
,
T. Bostoen
,
+4 authors
F. Turck
ACM Multimedia
2015
Corpus ID: 1434493
HTTP Adaptive Streaming (HAS) is today the number one video technology for over-the-top video distribution. In HAS, video content…
Expand
2011
2011
Aggregated modeling of thermostatic loads in demand response: A systems and control perspective
K. Kalsi
,
Forrest P. Chassin
,
D. Chassin
IEEE Conference on Decision and Control and…
2011
Corpus ID: 14471591
Demand response is playing an increasingly important role in smart grid research and technologies being examined in recently…
Expand
2011
2011
Credo: Trusted Computing for Guest VMs with a Commodity Hypervisor
Himanshu Raj
,
David Robinson
,
T. Tariq
,
P. England
,
S. Saroiu
,
A. Wolman
2011
Corpus ID: 1669206
This paper presents the Credo architecture to enable trustworthy virtualization based cloud computing platforms. A key feature of…
Expand
Highly Cited
2008
Highly Cited
2008
B-APT: Bayesian Anti-Phishing Toolbar
Peter Likarish
,
Eunjin Jung
,
Donald E. Dunbar
,
Thomas E. Hansen
,
J. Hourcade
IEEE International Conference on Communications
2008
Corpus ID: 2557287
Identity theft is one of the fastest growing crimes in the nation, and phishing has been a primary tool used for this type of…
Expand
2007
2007
Extensible Web Browser Security
M. Louw
,
Jin Soon Lim
,
V. Venkatakrishnan
International Conference on Detection of…
2007
Corpus ID: 10594361
In this paper we examine the security issues in functionality extension mechanisms supported by web browsers. Extensions (or…
Expand
2007
2007
Magnetically Modified Soft Micro Actuators for Oocyte Manipulation
Y. Yamanishi
,
S. Sakuma
,
F. Aral
Micro-NanoMechatronics and Human Science
2007
Corpus ID: 31185735
We have developed novel magnetically driven polymeric microtool for non-intrusive and no contamination experiments on a chip. The…
Expand
2002
2002
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods
Ludovic Casset
FME
2002
Corpus ID: 18663479
The Java security policy is implemented using security components such as a Java Virtual Machine (JVM), API, verifier, and a…
Expand
Highly Cited
2002
Highly Cited
2002
Short-term load forecasting based on artificial neural networks parallel implementation
K. Kalaitzakis
,
G. Stavrakakis
,
E. M. Anagnostakis
2002
Corpus ID: 17732448
Highly Cited
1982
Highly Cited
1982
Forecasting of Hourly Load by Pattern Recognition??? a Deterministic Approach
A. Dehdashti
,
J. Tudor
,
Michael C. Smith
IEEE Power Engineering Review
1982
Corpus ID: 12514512
An algorithm using pattern recognition techniques and current weather parameters to forecast hourly electric load with a lead…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required