SIM lock

Known as: Subsidy lock, SIM-lock, Simlocked 
A SIM lock, simlock, network lock or (master) subsidy lock is a technical restriction built into GSM and CDMA mobile phones by mobile phone… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
This open source computing framework unifies streaming, batch, and interactive big data workloads to unlock new applications. 
  • figure 1
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2013
Highly Cited
2013
New normal linear modeling strategies are presented for analyzing read counts from RNA-seq experiments. The voom method estimates… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Recent findings [HOT06] have made possible the learning of deep layered hierarchical representations of data mimicking the brains… (More)
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 1.4
  • figure 1.5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
MOTIVATION Advances in techniques to sparsely label neurons unlock the potential to reconstruct connectivity from 3D image stacks… (More)
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
What can happen if we combine the best ideas from the Social Web and Semantic Web? The Social Web is an ecosystem of… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
There is general agreement that metamodeling is an essential foundation for model driven development, but there is less consensus… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In a single second a modern processor can execute billions of instructions. Obtaining a bird's eye view of the behavior of a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A major obstacle to finding program errors in a real system is knowing what correctness rules the system must obey. These rules… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
High-performance transaction system applications typically insert rows in a History table to provide an activity trace; at the… (More)
  • figure 2.1
  • figure 2.2
  • figure 3.1
  • figure 3.1
  • figure 6.1
Is this relevant?