Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,058,998 papers from all fields of science
Search
Sign In
Create Free Account
Pathname
Known as:
File Path
, Path
The specification of a node (file or directory) in a hierarchical file system, usually specified by listing the nodes top-down.
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
Pathology procedure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records
Jiarong Wang
,
Lijun Cai
,
Aimin Yu
,
Min Zhu
,
Dan Meng
17th IEEE International Conference On Trust…
2018
Corpus ID: 52164939
The need for protecting information stored in the personal computer prompts the development of masquerade detection system (MDS…
Expand
2012
2012
Beep, Beep, Beep, Back It Up! A Fool Proof Approach to Archiving with no Copying
Kristen Reece Harrington
2012
Corpus ID: 61936270
Have you been asked to revise a derivation and then several months later asked to revert back to the previous derivation code? Or…
Expand
2009
2009
Notice of RetractionResearch on Address Tactic of Internet Documents' Semantization Based on Fractal Theory
Li Wang
,
Ji Ma
,
Xiaoning Wang
First International Conference on Information…
2009
Corpus ID: 1293628
Starting from semantization of Internet documents, aiming the issue of Internet address' ergod whose objective is converting HTML…
Expand
2008
2008
Using Dynamic Data Exchange (DDE) and Macro Variables to Create Custom Excel Workbooks with Multi-Sheets
Kathy Shepperson
,
Barbara A. Kolln
2008
Corpus ID: 111347281
Dynamic Data Exchange (DDE) - why can’t we seem to get away from it? If you are currently running SAS Version 9 and MSOffice 2002…
Expand
2006
2006
A Novel Approach to Trojan Horse Detection by Process Tracing
N. Wu
,
Yanming Qian
,
Guiqing Chen
IEEE International Conference on Networking…
2006
Corpus ID: 31821207
Nowdays we are more and more concerned with the security of networks for it is vulnerable for the Internet to be attacked. Trojan…
Expand
2003
2003
Efficient Long-Term Data Storage utilizing Object Abstraction with Content Addressing
R. Primmer
2003
Corpus ID: 54924973
HDD prices have declined and reliability has increased to the point where economics no longer dictate that IT settle for less…
Expand
2001
2001
How Precise are Perceived Levels of Corruption
J. Lambsdorff
2001
Corpus ID: 56215227
Review
1998
Review
1998
Constructing Neural Circuits and Networks
M. Vanier
,
D. Beeman
1998
Corpus ID: 17153103
In this chapter, we demonstrate how to use GENESIS to set up a simple network of biologically realistic neurons. This will not be…
Expand
1990
1990
Introduction to the C Shell
D. W. Topham
1990
Corpus ID: 61629624
In Chapters 21 to 24, you learned about the Bourne shell (the original shell developed by Stephen R. Bourne at Bell Laboratories…
Expand
1988
1988
Design and implementation of a biomedical image database (BDIM).
F. Aubry
,
S. Badaoui
,
H. Kaplan
,
R. Di Paola
Medical informatics = Medecine et informatique
1988
Corpus ID: 26099239
We developed a biomedical image database (BDIM) which proposes a standardized representation of value arrays such as images and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE