TiK

TiK is an open source instant messaging client for the AOL Instant Messenger (AIM) system, which uses AOL's TOC protocol. It is a GUI client which is… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1947-2016
024619472015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Methamphetamine (MA), commonly known by the street name “tik” in South Africa, is a highly addictive stimulant whose production… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
2008
2008
DSR is one of the first routing algorithms proposed to operate in ad hoc networks. Several secure on- demand ad hoc routing… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
Every user at TIK [4] that has its own PC-compatible standing under his desk and needs to work with a real Operating System like… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
Is this relevant?
2006
2006
Packet switching technologies such as Gigabit Ethernet or IP over WDM are gradually replacing the traditional telephony (PDH/SDH… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • figure 2
Is this relevant?
2002
2002
eXtensible Abstract State Machines (XASM) [1, 4, 2, 3] has been designed and implemented by Anlauff as formal development tool… (More)
  • figure 1
Is this relevant?
2002
2002
  • Seppo Äyräväinen
  • 2002
This paper describes various aliasing problems in computer graphics, and the techniques for eliminating them, or reducing their… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • figure 2
Is this relevant?