Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,677,409 papers from all fields of science
Search
Sign In
Create Free Account
Text-based (computing)
Known as:
Character-based
, Text based
, Text-based
Usually used in reference to a computer application, a text-based application is one whose primary input and output are based on text rather than…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Code point
Computer
Computer keyboard
Computer terminal
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
A Stroke-Based Textual Password Authentication Scheme
Ziran Zheng
,
Xiyu Liu
,
Lizi Yin
,
Zhaocheng Liu
First International Workshop on Education…
2009
Corpus ID: 14202821
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To…
Expand
Highly Cited
2008
Highly Cited
2008
Photo-based question answering
Tom Yeh
,
John J. Lee
,
Trevor Darrell
ACM Multimedia
2008
Corpus ID: 14801863
Photo-based question answering is a useful way of finding information about physical objects. Current question answering (QA…
Expand
Highly Cited
2007
Highly Cited
2007
Social presence in synchronous CMC-based language learning: How does it affect the productive performance and consciousness of learning objectives?
M. Yamada
,
K. Akahori
2007
Corpus ID: 8534637
This study examines potential designs in the usage of synchronous computer-mediated communication (SCMC) for communicative…
Expand
Highly Cited
2007
Highly Cited
2007
European Integration and the Social Science of EU Studies: The Disciplinary Politics of a Subfield
B. Rosamond
2007
Corpus ID: 34937101
This article takes the 50th anniversary of the Treaty of Rome as an opportunity to reflect upon half a century of academic…
Expand
Highly Cited
2004
Highly Cited
2004
Image Based Registration and Authentication System
S. Akula
,
V. Devisetty
2004
Corpus ID: 18951078
Security-sensitive environments protect their resources against unauthorized access by enforcing access control mechanisms. Text…
Expand
2004
2004
Comparing and Combining Generative and Posterior Probability Models: Some Advances in Sentence Boundary Detection in Speech
Yang Liu
,
A. Stolcke
,
Elizabeth Shriberg
,
M. Harper
Conference on Empirical Methods in Natural…
2004
Corpus ID: 7629308
Abstract : We compare and contrast two different models for detecting sentence-like units in continuous speech. The first…
Expand
2003
2003
Information and scientific visualization: separate but equal or happy together at last
T. Rhyne
,
Melanie Tory
,
T. Munzner
,
M. Ward
,
Chris R. Johnson
,
D. Laidlaw
IEEE Visualization, . VIS .
2003
Corpus ID: 12221989
Must we continue to define a difference between information and scientific visualization? Scientific visualization evolved first…
Expand
1995
1995
Estimating Phylogenies from Lacunose Distance Matrices, with Special Reference to DNA Hybridization Data
Franqois-Joseph Lapointe
,
John A W Kirschj
1995
Corpus ID: 13943696
Distance methods for producing phylogenies require n* comparisons among y1 taxa to generate a complete matrix. Moreover…
Expand
Review
1991
Review
1991
Social networks and classification in literature
W.
,
de Nooy
1991
Corpus ID: 145534177
1988
1988
The Tinkertoy Graphical Programming Environment
M. Edel
IEEE Trans. Software Eng.
1988
Corpus ID: 22202070
The Tinkertoy graphical interface to Lisp is described, in which programs are 'built' rather than written, out of icons and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE