Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,403,285 papers from all fields of science
Search
Sign In
Create Free Account
Network Computer
Known as:
NC
, Net PC
The Network Computer (or NC) was a diskless desktop computer device made by Oracle Corporation from approximately 1996 to 2000. The devices were…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Acorn Network Computer
Apple Pippin
Central processing unit
Client–server model
Expand
Broader (1)
Classes of computers
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Knowledge management system model in enhancing knowledge facilitation of Software Process Improvement for Software House Organization
R. Abdullah
,
A. M. Talib
International Conference on Information Retrieval…
2012
Corpus ID: 6152996
Software Process Improvement (SPI) is necessity to any Software House Organization (SHO). Process improvement requires embedding…
Expand
Highly Cited
2011
Highly Cited
2011
Pyramidal Systems for Computer Vision
V. Cantoni
,
S. Levialdi
NATO ASI Series
2011
Corpus ID: 29282208
This book presents papers on image processing using supercomputers and array processors. Topics considered include parallel…
Expand
2008
2008
Acknowledged broadcasting in ad hoc radio networks
Emanuele G. Fusco
,
A. Pelc
Information Processing Letters
2008
Corpus ID: 15337321
2006
2006
Top mirror optimization of high-speed intracavity - contacted oxide-confined vertical-cavity surface - emitting lasers
V. Lysak
,
K. Chang
,
Y. T. Lee
2006
Corpus ID: 55301388
This work presents the simulation of the intra-cavity contacted oxide vertical confined cavity surface emitting lasers (VCSEL…
Expand
2005
2005
Protecting cryptographic keys and computations via virtual secure coprocessing
J. P. McGregor
,
R. Lee
CARN
2005
Corpus ID: 6680936
Cryptographic processing is a critical component of secure networked computing systems. The protection offered by cryptographic…
Expand
2004
2004
E-mail viruses: how organizations can protect their e-mails
Dong-Her Shih
,
Hsiu-Sen Chiang
Online information review (Print)
2004
Corpus ID: 12092346
An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the…
Expand
2003
2003
A personal authentication scheme using mobile technology
J. Herrera-Joancomartí
,
Josep Prieto
Proceedings ITCC . International Conference on…
2003
Corpus ID: 14787263
Security is a major concern in mobile commerce where information is sent over the air. Authentication is possibly the most…
Expand
1998
1998
An Oceanographic Data Acquisition System (ODAS) for Ethernet LANs for Spanish research vessels
J. Sorribas
,
A. Tudela
,
+4 authors
D. Montéro
IEEE Oceanic Engineering Society. OCEANS'98…
1998
Corpus ID: 15116269
This paper presents an Oceanographic Data Acquisition System implemented using Local Area Network (LAN) capabilities for large…
Expand
Highly Cited
1996
Highly Cited
1996
The Network Computer as Precision Timekeeper
D. Mills
1996
Corpus ID: 10763217
Abstract : This paper describes algorithms to discipline a computer clock to a source of standard time, such as a GPS receiver or…
Expand
1995
1995
Mapping Bayesian Networks to Boltzmann Machines
P. Myllymäki
1995
Corpus ID: 15583589
We study the task of nding a maximal a posteriori (MAP) instantiation of Bayesian network variables, given a partial value…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE