Supremacy: Your Will Be Done

Known as: Overlord (1990 video game), Overlord (1990 computer game), Overlord (computer game) 
Supremacy: Your Will Be Done, released as Overlord in the US, is a strategy video game designed by David Perry & Nick Bruty and produced by Probe… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Sergio Boixo, Sergei V. Isakov, Vadim N. Smelyanskiy, Ryan Babbush, Nan Ding, Zhang Jiang, 4 Michael J. Bremner, John M. Martinis… (More)
  • figure V
Is this relevant?
2016
2016
In the near future, there will likely be special-purpose quantum computers with 40-50 high-quality qubits. This paper lays… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2011
2011
The cosmetic use of chemical agents to lighten the complexion of one’s skin, also referred to as skin whitening, skin lightening… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The supremacy of n-gram models in statistical language modelling has recently been challenged by parametric models that use… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
2007
2007
Colorism is a persistent problem for people of color in the USA. Colorism, or skin color stratification, is a process that… (More)
Is this relevant?
2006
2006
The article addresses the nature of power relations that sustain and disguise white racial hegemony in contemporary ‘western… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This article advances a new framework for investigating a simple yet fundamental question: in what ways does the law on the books… (More)
  • table 2
  • table 3
  • table 4
  • table 5
  • table 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources… (More)
  • figure 2
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1997