Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,271,472 papers from all fields of science
Search
Sign In
Create Free Account
Super key (keyboard button)
Known as:
Super
, Super key
The Super key refers to several different keys throughout keyboard history. Originally the Super key was a modifier key on the Space-cadet keyboard…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
BSD
Bucky bit
Computer keyboard
Editor war
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Fast Global Method Combined with Local Features for 6D Object Pose Estimation
Zhengya Guo
,
Ziqi Chai
,
Chao-yuan Liu
,
Z. Xiong
IEEE/ASME International Conference on Advanced…
2019
Corpus ID: 204815685
With the advancement of intelligent manufacturing, robots are increasingly involved in industrial production, for example…
Expand
2011
2011
Derivation of Database Keys' Operations
A. Akinwale
,
O. Folorunso
,
A. Sodiya
2011
Corpus ID: 60223795
Introduction Designing database is an art process similar to building a house. Database designers always face the problems of…
Expand
2010
2010
Efficient date-constraint access control and key management scheme for mobile agents.
Y. Chung
,
T. Chen
,
陳澤雄
2010
Corpus ID: 18883447
A mobile agent has become a competent software nowadays because of its significant abilities. It can roam freely in different…
Expand
2010
2010
Minimum Cost Routing Based on Network Coding in Wireless Mesh Networks
X. Shen
,
Zhigang Chen
,
Ying Guo
,
Hui Ye
International Conference on Multimedia Technology
2010
Corpus ID: 60678962
Wireless mesh networks can significantly improve the transmission performance of multi-hop links by using network coding. Thus, a…
Expand
2006
2006
Rapid chaotic synchronization by intermittent driving signals
P. Vaidya
,
S. Anand
2006
Corpus ID: 59407460
Abstract—Synchronization of two identical chaotic systems which starts with different initial conditions, by sending a part of…
Expand
2005
2005
Cryptography Based on Chaotic Synchronization: round Iii
P. Vaidya
,
S. Anand
IACR Cryptology ePrint Archive
2005
Corpus ID: 12198337
This paper discusses cryptography based on the property of chaotic synchronization. Specifically, it is about Round III of such a…
Expand
2004
2004
Incremental Maintenance of Data Warehouses Based on Past Temporal Logic Operators
S. D. Amo
,
Mirian Halfeld-Ferrari
Journal of universal computer science (Online)
2004
Corpus ID: 1526319
We see a temporal data warehouse as a set of temporal views defined in the past frag- ment of the temporal relational algebra…
Expand
1993
1993
Super-Key Classes for Updating Materialized Derived Classes in Object Bases
S. Konomi
,
T. Furukawa
,
Y. Kambayashi
International Conference on Deductive and Object…
1993
Corpus ID: 16124665
We describe data structures that allow efficient updates of materialized classes derived from relationship of classes in object…
Expand
1992
1992
Conditions of efficient updates on network structures
S. Konomi
,
T. Furukawa
,
Y. Kambayashi
Systems and Computers in Japan
1992
Corpus ID: 6858684
Redundant network structures allow efficient retrievals. Procedures to design network structures that allow efficient retrievals…
Expand
1991
1991
Updating duplicate values in distributed multidatabase systems
S. Konomi
,
T. Furukawa
[] Proceedings. First International Workshop on…
1991
Corpus ID: 834232
Redundant data for fast retrieval increase costs of updates in distributed multidatabase systems. In this paper, costs of updates…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE