Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,411,191 papers from all fields of science
Search
Sign In
Create Free Account
Plug-in (computing)
Known as:
Plugins
, OOPP
, Plugin pattern
Expand
In computing, a plug-in (or plugin, add-in, addin, add-on, addon, or extension) is a software component that adds a specific feature to an existing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARToolKit
ATLAS Transformation Language
Ableton Live
Actionspace
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Hierarchical plug-in EV control based on primary frequency response in interconnected smart grid
Hassan Haes Alhelou
,
M. Golshan
24th Iranian Conference on Electrical Engineering…
2016
Corpus ID: 24528069
The penetration level of the renewable energy resources (RER), such as wind power turbines and solar photovoltaic generation, in…
Expand
Review
2009
Review
2009
Security for wireless sensor networks: A review
M. Healy
,
T. Newe
,
E. Lewis
IEEE Sensors Applications Symposium
2009
Corpus ID: 18577476
Due to the sensitive nature of the data gathered by many wireless sensor networks (WSNs) it is becoming critical that this data…
Expand
Highly Cited
2006
Highly Cited
2006
Intermediate-representation recovery from low-level code
T. Reps
,
Gogul Balakrishnan
,
Junghee Lim
ACM SIGPLAN Workshop on Partial Evaluation and…
2006
Corpus ID: 3244574
The goal of our work is to create tools that an analyst can use to understand the workings of COTS components, plugins, mobile…
Expand
Highly Cited
2006
Highly Cited
2006
Comparison of the Effects of Three Approaches on the Frequency of Stimulus Activations, via a Single Switch, by Students With Profound Intellectual Disabilities
L. Mechling
2006
Corpus ID: 55125318
The effects of three classes of reinforcing stimuli were compared across three students with profound intellectual disabilities…
Expand
Highly Cited
2005
Highly Cited
2005
CIDS: An agent-based intrusion detection system
D. Dasgupta
,
F. González
,
K. Yallapu
,
Jonatan Gomez
,
R. Yarramsettii
Computers & security
2005
Corpus ID: 18153124
Highly Cited
2004
Highly Cited
2004
Decentralised Data Fusion And Control In Active Sensor Networks
H. Durrant-Whyte
,
A. Makarenko
2004
Corpus ID: 16367316
The paper presents an algorithm for Bayesian decentralized data fusion (BDDF) and its extension to informationtheoretic control…
Expand
Highly Cited
2004
Highly Cited
2004
Model-driven business process recovery
Ying Zou
,
Terence C. Lau
,
K. Kontogiannis
,
Tack Tong
,
Ross McKegney
Working Conference on Reverse Engineering
2004
Corpus ID: 1647469
A business process attempts to encapsulate the delivery of a sequence of tasks, typically starting from accepting a service…
Expand
Highly Cited
1999
Highly Cited
1999
A Remote Laboratory Using Virtual Reality on the Web
C. Schmid
International Conference on Advances in System…
1999
Corpus ID: 9294181
This contribution presents a remote laboratory approach using virtual reality on the Web. Extensions like plug-ins and Java…
Expand
Highly Cited
1997
Highly Cited
1997
Software Implementation of an MLS Analyzer with Tools for Convolution, Auralization and Inverse Filtering
A. Farina
,
Fabrizio Righini
1997
Corpus ID: 40120666
The paper describes a suite of software tools, which have been developed as extensions to the most diffused shareware program for…
Expand
Highly Cited
1940
Highly Cited
1940
Technical Drawing
F. Giesecke
1940
Corpus ID: 58440300
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE