Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Text-based (computing)

Known as: Character-based, Text based, Text-based 
Usually used in reference to a computer application, a text-based application is one whose primary input and output are based on text rather than… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Comunicacio presentada a la 2016 Conference of the North American Chapter of the Association for Computational Linguistics… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2011
Highly Cited
2011
While logistic sigmoid neurons are more biologically plausible than hyperbolic tangent neurons, the latter work better for… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Highly Cited
2008
Highly Cited
2008
The aim of this paper is to address recognition of natural human actions in diverse and realistic video settings. This… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Review
2007
Review
2007
Since its publication in The Internet and Higher Education, Garrison, Anderson, and Archer's [Garrison, D. R., Anderson, T… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2004
Highly Cited
2004
We describe the Photobook system, which is a set of interactive tools for browsing and searching images and image sequences… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
We consider the problem of modeling annotated data---data with multiple types where the instance of one type (such as a caption… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2001
Highly Cited
2001
Abstract This article describes a practical approach to judging the nature and quality of critical discourse in a computer… Expand
Highly Cited
1999
Highly Cited
1999
Abstract The purpose of this study is to provide conceptual order and a tool for the use of computer-mediated communication (CMC… Expand
  • figure 1
  • table 1
  • figure 2
Highly Cited
1999
Highly Cited
1999
In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
1996
Highly Cited
1996
From the Publisher: Co-authored by the creator of the Java technology and an experienced object-oriented developer, The Java (TM… Expand