Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,391,230 papers from all fields of science
Search
Sign In
Create Free Account
Pre-boot authentication
Known as:
PBA
Pre-Boot Authentication (PBA) or Power-On Authentication (POA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
BIOS
Data at rest
Data security
Encryption
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Dynamic patient admission scheduling with operating room constraints, flexible horizons, and patient delays
Sara Ceschia
,
Andrea Schaerf
Journal of Scheduling
2014
Corpus ID: 5430861
We revisit and extend the patient admission scheduling problem, in order to make it suitable for practical applications. The main…
Expand
Highly Cited
2013
Highly Cited
2013
Hydrogel-Based Glucose Sensors: Effects of Phenylboronic Acid Chemical Structure on Response
Chunjie Zhang
,
M. Losego
,
M. Losego
,
P. Braun
2013
Corpus ID: 14999718
Phenylboronic acids (PBAs) are being considered for glucose sensing and controlled insulin release, because of their affinity for…
Expand
Review
2013
Review
2013
REDD+ as Performance-Based Aid: General Lessons and Bilateral Agreements of Norway
A. Angelsen
2013
Corpus ID: 59032530
REDD+, when it officially became part of the international climate agenda in 2007, was an idea about payment to countries and…
Expand
2010
2010
Tuning the hydrophilic-hydrophobic balance of block-graft copolymers by click strategy: synthesis and characterization of amphiphilic PCL-b-(PαN3CL-g-PBA) copolymers
Ren-Shen Lee
,
Yi-ting Huang
2010
Corpus ID: 36401370
Tuning the hydrophilic–hydrophobic balance of amphiphilic block-graft PCL-b-(PαN3CL-g-PBA) copolymers by Click strategy.
Highly Cited
2008
Highly Cited
2008
Property-Based Attestation without a Trusted Third Party
Liqun Chen
,
Hans Löhr
,
M. Manulis
,
A. Sadeghi
Information Security Conference
2008
Corpus ID: 10952200
The Trusted Computing Group (TCG) has proposed the binary attestation mechanism that enables a computing platform with a…
Expand
Highly Cited
2007
Highly Cited
2007
Simple synthesis of three primary colour nanoparticle inks of Prussian blue and its analogues
A. Gotoh
,
Hiroaki Uchida
,
+13 authors
M. Kurihara
2007
Corpus ID: 56261822
Historic Prussian blue (PB) pigment is easily obtained as an insoluble precipitate in quantitative yield from an aqueous mixture…
Expand
Highly Cited
2004
Highly Cited
2004
Hierarchical Bloom filter arrays (HBA): a novel, scalable metadata management system for large cluster-based storage
Yifeng Zhu
,
Hong Jiang
,
Jun Wang
IEEE International Conference on Cluster…
2004
Corpus ID: 5775560
An efficient and distributed scheme for file mapping or file lookup scheme is critical in decentralizing metadata management…
Expand
Highly Cited
1998
Highly Cited
1998
The Perfect Boundary Approximation Technique Facing the Big Challenge of High Precision Field Computation
B. Krietenstein
,
P. Thoma
,
T. Weiland
,
R. Schuhmann
1998
Corpus ID: 53448092
Computational tools for the design of accelerating structures are in use since decades. While highly accurate methods exist for…
Expand
Highly Cited
1996
Highly Cited
1996
The Effect of Object-Oriented Frameworks on Developer Productivity
Simon Moser
,
Oscar Nierstrasz
Computer
1996
Corpus ID: 206403503
Cost and time estimation are difficult problems in software development projects. Software metrics tackle this problem by…
Expand
Highly Cited
1986
Highly Cited
1986
On maximal intermediate logics with the disjunction property
L. Maksimova
Studia Logica: An International Journal for…
1986
Corpus ID: 7115930
For intermediate logics, there is obtained in the paper an algebraic equivalent of the disjunction propertyDP. It is proved that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE