Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,789,302 papers from all fields of science
Search
Sign In
Create Free Account
Studio monitor
Known as:
Studio speaker
, Monitor
, Nearfield monitors
Expand
Studio monitors are loudspeakers specifically designed for audio production applications, such as recording studios, filmmaking, television studios…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Altec Lansing Duplex
Audio crossover
Audio engineer
Audio power
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
B. Lang
,
Jinmiao Wang
,
Yanxi Liu
IEEE Access
2017
Corpus ID: 5422851
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access…
Expand
2014
2014
Dynamic Audio Imaging In Radial Virtual Reality Environments
Mark Blewett
,
James Pinkl
,
Bryan Dalle Molle
2014
Corpus ID: 107055735
The CAVE2 is a large-scale, 320-degree, 3D/2D, virtual-reality environment developed by the Electronic Visualization Laboratory…
Expand
2013
2013
Reference Monitors for Security and Interoperability in OAuth 2.0
Ronan-Alexandre Cherrueau
,
Rémi Douence
,
+4 authors
Matteo Dell'Amico
DPM/SETOP
2013
Corpus ID: 15904949
OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over…
Expand
2012
2012
On the parameterized complexity of the workflow satisfiability problem
J. Crampton
,
G. Gutin
,
Anders Yeo
Conference on Computer and Communications…
2012
Corpus ID: 3423561
A workflow specification defines a set of steps and the order in which those steps must be executed. Security requirements may…
Expand
2011
2011
Direct-writing organic three-dimensional nanofibrous structure
Han Wang
,
G. Zheng
,
Wenwang Li
,
Xiang Wang
,
Daoheng Sun
2011
Corpus ID: 95189724
Direct-writing technology based on Near-Field Electrospinning (NFES) was used to fabricate an organic three-dimensional…
Expand
2010
2010
Access Control, Security, and Trust - A Logical Approach
Shiu-Kai Chin
,
Susan Older
Chapman & Hall/CRC Cryptography and Network…
2010
Corpus ID: 33438803
and trust are among the greatest risks—compliance and otherwise—facing corporations today. Controlling access to protected…
Expand
2010
2010
Challenges and Future Directions of Software Technology: Secure Software Development
B. Thuraisingham
,
Kevin W. Hamlen
IEEE 34th Annual Computer Software and…
2010
Corpus ID: 14333840
Developing large scale software systems has major security challenges. This paper describes the issues involved and then…
Expand
2007
2007
Matching Midlet’s Security Claims with a Platform Security Policy using Automata Modulo Theory∗
F. Massacci
,
I. Siahaan
2007
Corpus ID: 14867415
Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on its security behavior that…
Expand
2005
2005
Guarding Programs Against Attacks with Dynamic Data Flow Analysis
W. Chang
,
Calvin Lin
2005
Corpus ID: 16917486
The defense of computers against malicious attackers is a gr owing challenge. While techniques have been proposed for guardin g…
Expand
1990
1990
Integrating cryptography in the trusted computing base
M. Roe
,
T. Casey
[] Proceedings of the Sixth Annual Computer…
1990
Corpus ID: 40949660
Secure distributed systems are not easily constructed, as they combine mechanisms based on very different theories of security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE