Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,942,556 papers from all fields of science
Search
Sign In
Create Free Account
Tempest
Known as:
Tempest arcade
, Tempest (Atari)
, Tempest (game)
Expand
Tempest is a 1981 arcade game by Atari Inc., designed and programmed by Dave Theurer. It takes place on a three-dimensional surface, sometimes…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
"Classic" Mac OS
Acorn Electron
Arcade game
Atari
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
European Demoicracy and its Crisis
Kalypso Nicolaïdis
2013
Corpus ID: 146519685
This article offers an overview and reconsideration of the idea of European demoicracy in the context of the current crisis. It…
Expand
Highly Cited
2011
Highly Cited
2011
International Relations Theory and the End of the Cold War
J. Gaddis.
2011
Corpus ID: 14897416
I Pr inces have always sought out soothsayers of one kind or another for the purpose of learning what the future holds. These…
Expand
Highly Cited
2011
Highly Cited
2011
Why Marx Was Right
T. Eagleton
2011
Corpus ID: 142770416
One of the foremost Marxist critics of his generation forcefully argues against Marx's irrelevancy In this combative…
Expand
Highly Cited
2009
Highly Cited
2009
Tempest in a Teapot: Compromising Reflections Revisited
M. Backes
,
Tongbo Chen
,
Markus Dürmuth
,
H. Lensch
,
M. Welk
IEEE Symposium on Security and Privacy
2009
Corpus ID: 3985924
Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user's shirt, can be used to spy…
Expand
Review
2003
Review
2003
Exploratory spatio-temporal visualization: an analytical review
N. Andrienko
,
G. Andrienko
,
Peter Gatalsky
Journal of Visual Languages and Computing
2003
Corpus ID: 9947230
Highly Cited
2002
Highly Cited
2002
Network security - private communication in a public world
C. Kaufman
,
R. Perlman
,
M. Speciner
Prentice Hall series in computer networking and…
2002
Corpus ID: 37316854
The classic guide to network securityi¾now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet…
Expand
Review
2000
Review
2000
Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences
Steve H. Weingart
Workshop on Cryptographic Hardware and Embedded…
2000
Corpus ID: 26554264
As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing…
Expand
Highly Cited
1999
Highly Cited
1999
A Brief History of Downside Risk Measures
David N. Nawrocki
1999
Corpus ID: 155082662
Downside risk measures in portfolio analysis purport to be a major improvement over traditional portfolio theory. This article…
Expand
Highly Cited
1998
Highly Cited
1998
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
M. Kuhn
,
Ross J. Anderson
Information Hiding
1998
Corpus ID: 205962
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques…
Expand
Highly Cited
1987
Highly Cited
1987
Caribbean and African Appropriations of "The Tempest"
R. Nixon
Critical Inquiry
1987
Corpus ID: 155000165
The era from the late fifties to the early seventies was marked in Africa and the Caribbean by a rush of newly articulated…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE