Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,464 papers from all fields of science
Search
Sign In
Create Free Account
SIM lock
Known as:
Subsidy lock
, SIM-lock
, Simlocked
Expand
A SIM lock, simlock, network lock or (master) subsidy lock is a technical restriction built into GSM and CDMA mobile phones by mobile phone…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
BlackBerry Storm
BlackBerry Storm 2
Firmware
Hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Android-based home door locks application via Bluetooth for disabled people
Nurulhuda Ismail
,
Z. Tukiran
,
N. N. Shamsuddin
,
E. I. S. Saadon
IEEE International Conference on Control System…
2014
Corpus ID: 2679960
This paper discusses about an ongoing project that serves the needs of people with physical disabilities at home. It uses the…
Expand
2013
2013
A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm
Thi Hanh Nguyen
,
Yi (Estelle) Wang
,
T. N. Nguyen
,
Renfa Li
International Conference on Signal Processing…
2013
Corpus ID: 17592723
Fuzzy vault is one of the most popular algorithms, which is used to protect the biometric templates and secret key simultaneously…
Expand
2009
2009
Fully Distributed Scrum: Linear Scalability of Production between San Francisco and India
J. Sutherland
,
Guido Schoonheim
,
N. Kumar
,
V. Pandey
,
S. Vishal
Agile Conference
2009
Corpus ID: 14539699
The Scrum software development framework was designed for the hyperproductive state where productivity increases by 5-10 times…
Expand
Highly Cited
2009
Highly Cited
2009
Dacota: Post-silicon validation of the memory subsystem in multi-core designs
Andrew DeOrio
,
I. Wagner
,
V. Bertacco
IEEE 15th International Symposium on High…
2009
Corpus ID: 7838277
The number of functional errors escaping design verification and being released into final silicon is growing, due to the…
Expand
Review
2008
Review
2008
Data Mining for Business Intelligence
Magdalini Eirinaki
2008
Corpus ID: 192637899
Course Overview The rapid proliferation of the Internet and related technologies has created an unprecedented opportunity for…
Expand
2006
2006
Specification of SUMO 1-and SUMO 2-interacting Motifs *
Christina-Maria Hecker
,
M. Rabiller
,
K. Haglund
,
P. Bayer
,
I. Dikič
2006
Corpus ID: 33463582
SUMOproteins are ubiquitin-relatedmodifiers implicated in the regulation of gene transcription, cell cycle, DNA repair, and…
Expand
Highly Cited
2004
Highly Cited
2004
Practical Suffix Tree Construction
Sandeep Tata
,
R. Hankins
,
J. Patel
Very Large Data Bases Conference
2004
Corpus ID: 14144538
2003
2003
The management of positive inter-store externalities in shopping centres: some empirical evidence
T. Yuo
,
N. Crosby
,
C. Lizieri
,
P. McCann
2003
Corpus ID: 56398405
In enclosed shopping centres, stores benefit from the positive externalities of other stores in the centre. Some stores provide…
Expand
1995
1995
From focus groups to editing groups: a new method of reception analysis
Brent MacGregor
,
David E. Morrison
1995
Corpus ID: 62564913
This paper reflects on focus groups as a research method by way of framing the exposition of a new method: the editing group…
Expand
Highly Cited
1983
Highly Cited
1983
Two-formant models of vowel perception: Shortcomings and enhancement
Anthony Bladon
Speech Communication
1983
Corpus ID: 24008538
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE