Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,355,653 papers from all fields of science
Search
Sign In
Create Free Account
Privacy
Known as:
Right Of Privacy
, Privacy right
, Personal privacy
Expand
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Activity tracker
American Libraries
Business process interoperability
CUPS (CMU)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Pathophysiology of stress-induced visceral hypersensitivity
O. I. Stanisor
2014
Corpus ID: 24862907
Visceral hypersensitivity is observed in the majority of patients with IBS and considered a pathophysiological mechanism. The aim…
Expand
Highly Cited
2013
Highly Cited
2013
Current problems and possible solutions in the treatment of nasopharyngeal carcinoma in Indonesia
M. Wildeman
,
Z. Novalić
,
+6 authors
A. Greijer
2013
Corpus ID: 6637062
De zorg voor patienten met nasopharynxkanker in Indonesie is op dit moment erg teleurstellend. Maarten Wildeman noemt in zijn…
Expand
Highly Cited
2013
Highly Cited
2013
Mobile computing - A green computing resource
He Ba
,
W. Heinzelman
,
Charles-Antoine Janssen
,
Jiye Shi
IEEE Wireless Communications and Networking…
2013
Corpus ID: 6248299
Cloud computing provides an approach to accessing shared computing resources. However, a traditional cloud is composed of…
Expand
Highly Cited
2011
Highly Cited
2011
Implementation of terminal middleware platform for mobile RFID computing
Namje Park
International Journal of Ad Hoc and Ubiquitous…
2011
Corpus ID: 13639317
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or…
Expand
Highly Cited
2009
Highly Cited
2009
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Hung-Yu Chien
,
C. Laih
J. Parallel Distributed Comput.
2009
Corpus ID: 44427660
Highly Cited
2008
Highly Cited
2008
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System
Hui Song
,
Sencun Zhu
,
G. Cao
IEEE INFOCOM - The 27th Conference on Computer…
2008
Corpus ID: 3099246
Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These…
Expand
Review
2007
Review
2007
Exploiting RFID digital information in enterprise collaboration
George Lekakos
Industrial management & data systems
2007
Corpus ID: 15077507
Purpose – The purpose of this paper is to investigate how a distributed network architecture, building on web‐service…
Expand
Highly Cited
2004
Highly Cited
2004
Mobility Prediction in Wireless Networks using Neural Networks
J. Capka
,
R. Boutaba
IFIP/IEEE International Conference on Management…
2004
Corpus ID: 7516491
Wireless network resource use depends in large part on the mobility of network users. The ability to predict this mobility at…
Expand
Highly Cited
2003
Highly Cited
2003
WebGIS for Monitoring "Sudden Oak Death" in coastal California
N. M. Kelly
,
K. Tuxen
Computers, Environment and Urban Systems
2003
Corpus ID: 36795199
Highly Cited
1985
Highly Cited
1985
The discovery of 4.4 second X-ray pulsations from the rapidly variable X-ray transient V0332 + 53
L. Stella
,
N. White
,
J. Davelaar
,
A. Parmar
,
R. Blissett
,
M. Klis
1985
Corpus ID: 124777776
On a observe trois sursauts de V 0332+53 avec l'Observatoire EXOSAT, entre novembre 1983 et janvier 1984. En plus de la…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE