Rogue

Known as: Amulet of Yendor, Yendor, Michael Toy 
Rogue (also known as Rogue: Exploring the Dungeons of Doom) is a dungeon crawling video game by Michael Toy and Glenn Wichman and later contributions… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
755 Many physical systems exhibit behaviour associated with the emergence of high-amplitude events that occur with low… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2013
Review
2013
Rogue waves is the name given by oceanographers to isolated large amplitude waves, that occur more frequently than expected for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2013
2013
Rogue waves observed in the ocean and elsewhere are often modelled by certain solutions of the nonlinear Schrodinger equation… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2012
2012
Mobile phones and carriers trust the traditional base stations which serve as the interface between the mobile devices and the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
Article history: Received 17 May 2011 Accepted 20 May 2011 Available online 27 May 2011 Communicated by V.M. Agranovich We… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its… (More)
  • table 2
  • figure 1
  • figure 2
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present a refined chosen-prefix collision construction for MD5 that allowed creation of a rogue Certification Authority (CA… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
2009
2009
We describe excitation and evolution of deterministic rogue waves in Bose-Einstein condensates either loaded into a parabolic… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?