Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,003,255 papers from all fields of science
Search
Sign In
Create Free Account
Source port
A source port, a portmanteau of source (code) and port(ing), is a software project based on the source code of a game engine that allows the game to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
2.5D
Abandonware
Aquaria
Battle.net
Expand
Broader (1)
Software maintenance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A configuration for double input Z-source DC-DC converters
F. Sedaghati
,
S. M. Salehian
,
H. Shayeghi
,
E. S. Asl
The Power Electronics, Drive Systems…
2018
Corpus ID: 5054819
This paper proposes a double input DC-DC converter based on modified Z-source converter. In the proposed converter, the input DC…
Expand
Highly Cited
2016
Highly Cited
2016
Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization
Gilberto Fernandes
,
L. F. Carvalho
,
J. Rodrigues
,
M. L. Proença
Journal of Network and Computer Applications
2016
Corpus ID: 11869860
2015
2015
SDN-based TCP congestion control in data center networks
Yifei Lu
,
Shuhong Zhu
IEEE International Performance, Computing, and…
2015
Corpus ID: 7392042
TCP incast usually happens when a receiver requests the data from multiple senders simultaneously. This many-to-one communication…
Expand
2015
2015
Alternative Source-Port-Tolerant Series-Connected Double-Input DC–DC Converter
Xiaofeng Sun
,
Yue Zhou
,
Wei Wang
,
Baocheng Wang
,
Zhe Zhang
IEEE transactions on power electronics
2015
Corpus ID: 27781676
The two input sources of a series-connected double-input dc/dc converter (SCDIC) can power the load simultaneously or…
Expand
2011
2011
Efficient method for inferring a firewall policy
Hyeonwoo Kim
,
Hongtaek Ju
Asia-Pacific Network Operations and Management…
2011
Corpus ID: 16774721
We propose a framework which infers the policy of firewall deployed in the Internet access point and computer system. The…
Expand
2010
2010
PARAMETRIC STUDIES OF THE PYRAMIDAL MI- CROWAVE ABSORBER USING RICE HUSK
H. Nornikman
,
F. Malek
,
+6 authors
F. H. Wee
2010
Corpus ID: 137949834
Agriculture waste has potential to be used as an alternative material for the microwave absorber used in the anechoic chamber…
Expand
2008
2008
A router-based technique to mitigate reduction of quality (RoQ) attacks
Amey Shevtekar
,
N. Ansari
Comput. Networks
2008
Corpus ID: 3132144
2008
2008
Delaunay–Voronoi Modeling of Power-Ground Planes With Source Port Correction
K. Wu
,
G. Shiue
,
Wei-Da Guo
,
Chien-Min Lin
,
R. Wu
IEEE Transactions on Advanced Packaging
2008
Corpus ID: 26180211
An efficient Delaunay-Voronoi modeling of the power-ground planes suitable directly for SPICE compatibity is proposed to deal…
Expand
2007
2007
SilentKnock: practical, provably undetectable authentication
Eugene Y. Vasserman
,
Nicholas Hopper
,
J. Tyra
International Journal of Information Security
2007
Corpus ID: 11917918
Port knocking is a technique to prevent attackers from discovering and exploiting vulnerable network services, while allowing…
Expand
2007
2007
A Rewriting Calculus for Multigraphs with Ports
Oana Andrei
,
H. Kirchner
RULE@RDP
2007
Corpus ID: 1596771
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE