Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,409,068 papers from all fields of science
Search
Sign In
Create Free Account
Oracle Fusion Applications
Known as:
OFA
, Oracle Fusion
Oracle Fusion Applications (OFA) are enterprise resource planning software applications from Oracle Corporation. It is distributed across various…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Application server
Comparison of accounting software
Corporate governance
Customer relationship management
Expand
Broader (1)
Middleware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Pro Oracle Fusion Applications
T. Thakker
Apress
2015
Corpus ID: 5129411
The first € price and the £ and $ price are net prices, subject to local VAT. Prices indicated with * include VAT for books; the…
Expand
2015
2015
Introduction to Oracle Fusion Applications
T. Thakker
2015
Corpus ID: 63513913
Oracle Fusion Applications is the next generation enterprise application suite from Oracle Corporation. It is not a new version…
Expand
2015
2015
Provisioning Oracle Fusion Applications Environment
T. Thakker
2015
Corpus ID: 63098832
Finally we have reached the most important step of the Fusion Applications installation, which is the installation of a Fusion…
Expand
2015
2015
Understanding Oracle Fusion Applications Interface
T. Thakker
2015
Corpus ID: 64204963
At this stage we have our Oracle Fusion Applications Environment ready and running. Before we begin with Fusion Applications…
Expand
2013
2013
Numerical simulation of the effect of over-fire air on NOx formation in furnace
Ding-zhu Wang
,
Er-peng Duan
,
Y. Guo
,
B. Sun
,
T. Bai
International Conference on Materials for…
2013
Corpus ID: 29286163
Numerical simulations were conducted for an 800MW ultra-supercritical utility boiler. The influences of over-fire air on…
Expand
2008
2008
Securing group key exchange against strong corruptions and key registration attacks
E. Bresson
,
M. Manulis
International Journal of Applied Cryptography
2008
Corpus ID: 15441058
In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information…
Expand
2001
2001
Valuing disorder : perspectives on radical contingency in modern society
J. Scanlan
2001
Corpus ID: 143102220
This thesis explores the relationship between social and individual forms of ordering social life on one hand, and the emergence…
Expand
2000
2000
The Zagreb Summit and Croatian foreign policy
D. Grubiša
2000
Corpus ID: 34554941
The policy of the six-parties Croatian coalition government, after the 2000 parliamentary and presidential elections, opened the…
Expand
Review
1999
Review
1999
Modular dynamic virtual-reality modeling of robotic systems
G. Ferretti
,
S. Filippi
,
C. Maffezzoni
,
G. Magnani
,
P. Rocco
IEEE Robotics Autom. Mag.
1999
Corpus ID: 46368008
This article presents the results of research into the field of dynamic simulation of mechanical and robotic systems. The main…
Expand
1996
1996
SYNTHESIS OF ENTANG LED ATOM IC STATES AND QUANTUM
C. Pellizzari
,
S. A. G. ardiner
,
J. Cirac
,
P. Z. forTheoreticalPhysics
1996
Corpus ID: 17374646
T he preparati on and coherent m ani pul ati on ofN {atom entangl ed states i sfun-dam entalto real i zi ng a quantum com puter…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE