Magnetic stripe card

Known as: Magstripe, Magnetic card system, Swipe-card 
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1942-2017
05019422016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Regenerating codes and codes with locality are schemes recently proposed for a distributed storage network. While regenerating… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The question of aggregating pairwise comparisons to obtain a global ranking over a collection of objects has been of interest for… (More)
  • figure 1
Is this relevant?
2012
2012
This paper describes a set of experiments in which an upper-torso humanoid robot learned to slide a card through a card reader… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We introduce a new notion of graph sparsification based on spectral similarity of graph Laplacians: spectral sparsification… (More)
Is this relevant?
2009
2009
This paper presents three methods that can be used to recognize paraphrases. They all employ string similarity measures applied… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Considerable advances have been made in learning to recognize and localize visual object classes. Simple bag-of-feature… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The Moderate Resolution Imaging Spectrometer (MODIS) aboard Terra and Aqua platforms are contaminated by stripe noises. There are… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a novel approach to real-time structured light range scanning. After an analysis of the underlying assumptions of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In developing secure applications and systems, the designers often must incorpomte secure user identifi­ cation in the design… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1990
Highly Cited
1990
An analysis of mirrored discs and of RAID5 shows that mirrors have considerably better throughput, measured as requests/second on… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 3
  • figure 4
Is this relevant?