Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

OpenBSD

Known as: OpenBSD Project, Puffy (mascot), Puffy 
OpenBSD is a Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Cloud computing is a recent phrase in marketing for a concept which has been known for years: Outsourcing. Cloud computing… 
Review
2012
Review
2012
We analyze rest-frame optical morphologies and gas-phase kinematics as traced by rest-frame far-UV and optical spectra for a… 
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Review
2010
Review
2010
The prevalence and frequency of symptoms of premenstrual syndrome (PMS) was assessed in female undergraduate students of the… 
  • table 1
  • table 2
  • figure 1
2009
2009
The present research investigated whether mental self-control strategies can reduce the automatic positivity elicited by tempting… 
  • table 1
  • figure 1
2006
2006
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each… 
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • table 3
2004
2004
SummaryThe morphogenesis of chromosomes at early prophase of spermatocytes I is studied in three ortoptherian species: Grillus… 
  • figure 7
  • figure 15
  • figure 22
  • figure 21
  • figure 27
Highly Cited
2001
Highly Cited
2001
Graphviz is a heterogeneous collection of graph drawing tools containing batch layout programs (dot, neato, fdp, twopi); a… 
Highly Cited
2001
Highly Cited
2001
Conventional Security have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun… 
Highly Cited
2001
Highly Cited
2001
The Cooperative File System (CFS) is a new peer-to-peer read-only storage system that provides provable guarantees for the… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
1999
Highly Cited
1999
Many authentication schemes depend on secret passwords. Unfortunately, the length and randomness of user-chosen passwords remain… 
  • figure I