Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,146,829 papers from all fields of science
Search
Sign In
Create Free Account
Text-based (computing)
Known as:
Character-based
, Text based
, Text-based
Usually used in reference to a computer application, a text-based application is one whose primary input and output are based on text rather than…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Code point
Computer
Computer keyboard
Computer terminal
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Sentiment Classification using Automatically Extracted Subgraph Features
Shilpa Arora
,
Elijah Mayfield
,
C. Rosé
,
Eric Nyberg
HLT-NAACL
2010
Corpus ID: 5091831
In this work, we propose a novel representation of text based on patterns derived from linguistic annotation graphs. We use a…
Expand
Highly Cited
2009
Highly Cited
2009
A Stroke-Based Textual Password Authentication Scheme
Ziran Zheng
,
Xiyu Liu
,
Lizi Yin
,
Zhaocheng Liu
First International Workshop on Education…
2009
Corpus ID: 14202821
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To…
Expand
Highly Cited
2008
Highly Cited
2008
Photo-based question answering
Tom Yeh
,
John J. Lee
,
Trevor Darrell
ACM Multimedia
2008
Corpus ID: 14801863
Photo-based question answering is a useful way of finding information about physical objects. Current question answering (QA…
Expand
Highly Cited
2007
Highly Cited
2007
Social presence in synchronous CMC-based language learning: How does it affect the productive performance and consciousness of learning objectives?
M. Yamada
,
K. Akahori
2007
Corpus ID: 8534637
This study examines potential designs in the usage of synchronous computer-mediated communication (SCMC) for communicative…
Expand
Highly Cited
2007
Highly Cited
2007
European Integration and the Social Science of EU Studies: The Disciplinary Politics of a Subfield
B. Rosamond
2007
Corpus ID: 34937101
This article takes the 50th anniversary of the Treaty of Rome as an opportunity to reflect upon half a century of academic…
Expand
Highly Cited
2004
Highly Cited
2004
Image Based Registration and Authentication System
S. Akula
,
V. Devisetty
2004
Corpus ID: 18951078
Security-sensitive environments protect their resources against unauthorized access by enforcing access control mechanisms. Text…
Expand
2004
2004
Comparing and Combining Generative and Posterior Probability Models: Some Advances in Sentence Boundary Detection in Speech
Yang Liu
,
A. Stolcke
,
Elizabeth Shriberg
,
M. Harper
Conference on Empirical Methods in Natural…
2004
Corpus ID: 7629308
Abstract : We compare and contrast two different models for detecting sentence-like units in continuous speech. The first…
Expand
2004
2004
Using Speech Act Profiling for Deception Detection
Douglas P. Twitchell
,
J. Nunamaker
,
J. Burgoon
Intelligence and Security Informatics
2004
Corpus ID: 15457342
The rising use of synchronous text-based computer-mediated communication (CMC) such as chat rooms and instant messaging in…
Expand
2003
2003
Information and scientific visualization: separate but equal or happy together at last
T. Rhyne
,
Melanie Tory
,
T. Munzner
,
M. Ward
,
Chris R. Johnson
,
D. Laidlaw
IEEE Visualization, . VIS .
2003
Corpus ID: 12221989
Must we continue to define a difference between information and scientific visualization? Scientific visualization evolved first…
Expand
1988
1988
The Tinkertoy Graphical Programming Environment
M. Edel
IEEE Trans. Software Eng.
1988
Corpus ID: 22202070
The Tinkertoy graphical interface to Lisp is described, in which programs are 'built' rather than written, out of icons and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE