Skip to search formSkip to main contentSkip to account menu

Tunneling protocol

Known as: SSH tunnel, Secure Shell tunneling, SSH tunneling 
In computer networks, a tunneling protocol allows a network user to access or provide a network service that the underlying network does not support… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
Linear metal string complexes of [MnL4(NCS)2] (Scheme 1, M = NiII, CoII, or CrII; n = 3 or 5; L = dpa- or tpda2- where dpa- is… 
Highly Cited
2001
Highly Cited
1999
Highly Cited
1999
We identify fundamental mechanisms of electron escape from self-organized InAs quantum dots ~QD’s! in a vertical electric field… 
Highly Cited
1999
Highly Cited
1999
The atomic arrangement of the technologically important As-rich GaAs 001 2 3 4 reconstructed surface is determined using bias… 
Highly Cited
1997
Highly Cited
1997
The surface structure of TiO 2~110! has been reexamined using scanning tunneling microscopy ~STM!, especially in terms of its… 
Highly Cited
1995
Highly Cited
1995
In situ scanning tunneling microscopy (STM) of the dissolution of a Cu(100) electrode in aqueous chloride media (HC1) was… 
Highly Cited
1993
Highly Cited
1993
A technique is presented for fabricating Si nanostructures with a scanning tunneling microscope operated in air. The process… 
Highly Cited
1993
Highly Cited
1993
A new highly accurate and detailed intermolecular potential surface for Ar–H2O is derived by a direct nonlinear least squares fit… 
Highly Cited
1990
Highly Cited
1990
Amorphous materials at low temperature have markedly different physical and thermal properties from crystals.' For example, the…