Server Message Block

Known as: Opportunistic Locking, CIFS protocol, Oplocks 
In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS, /ˈsɪfs/), operates as… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1992-2017
051019922017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Traffic classification, a mapping of traffic to network applications, is important for a variety of networking and security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2014
2014
, 558 (2014); 345 Science et al. Maximilian Schich A network framework of cultural history This copy is for your personal, non… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2013
2013
Bugs that cause reduced battery life in smartphones have been classified as energy bugs. The majority of previous research on… (More)
  • figure 2
  • figure 1
  • figure 3
  • table I
  • table II
Is this relevant?
2009
2009
Unchecked errors are especially pernicious in operating system file management code. Transient or permanent hardware failures are… (More)
  • figure 2
  • table 1
  • table 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Application-level protocol specifications are useful for many security applications, including intrusion prevention and detection… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2007
2007
Advances in microring-resonator-based photonic structures and novel architectures are described that demonstrate the first low… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2006
2006
This paper presents a convenient and safe way for using the peripherals of thin clients under the server-based computing model… (More)
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2002
2002
Self-securing storage turns storage devices into active parts of an intrusion survival strategy. From behind a thin storage… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?