Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,630,859 papers from all fields of science
Search
Sign In
Create Free Account
Pre-boot authentication
Known as:
PBA
Pre-Boot Authentication (PBA) or Power-On Authentication (POA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
BIOS
Data at rest
Data security
Encryption
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Virtual machine placement algorithm for virtualized desktop infrastructure
C. Man
,
Makoto Kayashima
IEEE International Conference on Cloud Computing…
2011
Corpus ID: 14542075
Finding optimal placement of virtual machines on numerous physical servers is one kind of bin-packing problem, which is known as…
Expand
2007
2007
Small, soft, and safe microactuator for retinal pigment epithelium transplantation
Yusaku Watanabe
,
Masanori Maeda
,
+6 authors
Satoshi Konishi
IEEE/LEOS International Conference on Optical…
2007
Corpus ID: 1216306
This paper proposes a novel surgical tool for the retinal pigment epithelium (RPE) sheet transplantation. The proposed tool…
Expand
2006
2006
Scheduling dependent items in data broadcasting environments
Hao-Ping Hung
,
Jen-Wei Huang
,
Jung-Long Huang
,
Ming-Syan Chen
ACM Symposium on Applied Computing
2006
Corpus ID: 2708746
Most of the prior research works in data broadcasting are based on the assumption that the disseminated items are independent of…
Expand
2006
2006
A Comparison of Probability Bounds Analysis and Sensitivity Analysis in Environmentally Benign Design and Manufacture
J. Aughenbaugh
,
S. Duncan
,
C. Paredis
,
B. Bras
Design Automation Conference
2006
Corpus ID: 16752057
There is growing acceptance in the design community that two types of uncertainty exist: inherent variability and uncertainty…
Expand
2006
2006
Trust[ed | in] computing, signed code and the heat death of the internet
J. Poritz
2006
Corpus ID: 13907876
The Trusted Computing Group (TCG) is an industry consortium which has invested in the design of a small piece of hardware…
Expand
2006
2006
Essays on the real and financial allocation of capital
Arturo Ramírez Verdugo
2006
Corpus ID: 152690402
This dissertation consists of three papers studying how firms allocate real and financial capital, and how taxes, the labor…
Expand
2005
2005
Decision Tree Construction for Genetic Applications Based on Association Rules
A. Sami
,
M. Takahashi
IEEE Region 10 Conference
2005
Corpus ID: 33857109
A decision tree is an effective means of data classification from which rules can be both expressive and precise. However…
Expand
2002
2002
Detection, Tracking and Avoidance of Multiple Dynamic Objects
K. Krishna
,
P. Kalra
J. Intell. Robotic Syst.
2002
Corpus ID: 1375406
Real-time motion planning in an unknown environment involves collision avoidance of static as well as moving agents. Strategies…
Expand
1991
1991
Modeling and Software Development Quality
S. H. Kan
IBM Systems Journal
1991
Corpus ID: 16939230
This paper summarizes the models used by a large software development organization for estimating software reliability and…
Expand
1986
1986
PBA: Percentage Based Allocation for acquisitions
David C. Genaway
1986
Corpus ID: 62573570
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE