Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,834 papers from all fields of science
Search
Sign In
Create Free Account
Loopback
Known as:
Loop back
, 127.0.0.7
, Loopback interface
Expand
Loopback, or loop-back, refers to the routing of electronic signals, digital data streams, or flows of items back to their source without intentional…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
ALSA
Access network
Bit error rate
Bogon filtering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Periodic-CRN: A Convolutional Recurrent Model for Crowd Density Prediction with Recurring Periodic Patterns
Ali Zonoozi
,
Jung-jae Kim
,
Xiaoli Li
,
G. Cong
International Joint Conference on Artificial…
2018
Corpus ID: 51606520
Time-series forecasting in geo-spatial domains has important applications, including urban planning, traffic management and…
Expand
Highly Cited
2015
Highly Cited
2015
Macrobend optical sensing for pose measurement in soft robot arms
S. Sareh
,
Y. Noh
,
Min Li
,
Tommaso Ranzani
,
Hongbin Liu
,
K. Althoefer
2015
Corpus ID: 106405099
This paper introduces a pose-sensing system for soft robot arms integrating a set of macrobend stretch sensors. The macrobend…
Expand
2010
2010
Characterization of wireless smart sensor performance
Lauren E. Linderman
,
J. Rice
,
S. Barot
,
B. Spencer
,
J. Bernhard
2010
Corpus ID: 52258646
A critical aspect of using wireless sensors for structural health monitoring is communication performance. Unlike wired systems…
Expand
Highly Cited
2009
Highly Cited
2009
A Practical Congestion Attack on Tor Using Long Paths
Nathan S. Evans
,
R. Dingledine
,
Christian Grothoff
USENIX Security Symposium
2009
Corpus ID: 12111308
In 2005, Murdoch and Danezis demonstrated the first practical congestion attack against a deployed anonymity network. They could…
Expand
Highly Cited
2006
Highly Cited
2006
A Time Reversal Transmission Approach for Multiuser UWB Communications
H. T. Nguyen
,
I. Kovács
,
P. Eggers
IEEE Transactions on Antennas and Propagation
2006
Corpus ID: 34902711
We propose and evaluate the performance of the time reversal technique in impulse radio ultrawideband (UWB) communications. The…
Expand
Highly Cited
2003
Highly Cited
2003
RF-BIST: loopback spectral signature analysis
D. Lupea
,
U. Pursche
,
Hans-Joachim Jentschel
Design, Automation and Test in Europe Conference…
2003
Corpus ID: 7721005
Built-in self-test (BIST) becomes important also for more complex structures like complete front-ends. In order to bring down the…
Expand
Highly Cited
1998
Highly Cited
1998
Effects of habitat isolation on the recovery of fish assemblages in experimentally defaunated stream pools in Arkansas
D. Lonzarich
,
M. Warren
,
Mary E. Lonzarich
1998
Corpus ID: 16948561
We removed fish from pools in two Arkansas streams to determine recolonization rates and the effects of isolation (i.e., riffle…
Expand
Highly Cited
1995
Highly Cited
1995
Ionoresistivity as a highly sensitive sensory probe: investigations of polythiophenes functionalized with calix[4]arene-based ion receptors
M. Marsella
,
R. Newland
,
P. Carroll
,
T. Swager
1995
Corpus ID: 93111795
Herein we report the synthesis, optical, and electrochemical properties of a calix[4]arene-~ubstituted polythiophene which…
Expand
Highly Cited
1993
Highly Cited
1993
Long-lived, highly luminescent rhenium(I) complexes as molecular probes: intra- and intermolecular excited-state interactions
LouAnn. Sacksteder
,
Maria Lee
,
J. Demas
,
B. DeGraff
1993
Corpus ID: 55960551
A series of isonitrile complexes of the form fac-LRe(CO) 3 CNR + , where L is an α-diimine and R=t-Bu or n-alkyl, have been…
Expand
Highly Cited
1990
Highly Cited
1990
Synthesis and Characterization of Surface-Capped, Size-Quantized CdS Clusters. Chemical Control of Cluster Size
N. Herron
,
Ying Wang
,
H. Eckert
1990
Corpus ID: 33331767
Clusters of CdS in the quantum confinement regime C5O-A diameter are prepared in a rational technique whereby the cluster size…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE