Skip to search formSkip to main contentSkip to account menu

Tunneling protocol

Known as: SSH tunnel, Secure Shell tunneling, SSH tunneling 
In computer networks, a tunneling protocol allows a network user to access or provide a network service that the underlying network does not support… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2002
Highly Cited
2002
The adsorption and supramolecular ordering of trimesic acid (TMA), 1,3,5-benzenetricarboxylic acid C 6 H 3 (COOH) 3 , on a Cu(100… 
Highly Cited
2001
Highly Cited
1999
Highly Cited
1999
We have investigated the structure and morphology of nanosized palladium clusters supported by a thin ${\mathrm{Al}}_{2}{\mathrm… 
Highly Cited
1999
Highly Cited
1999
We identify fundamental mechanisms of electron escape from self-organized InAs quantum dots ~QD’s! in a vertical electric field… 
Highly Cited
1998
Highly Cited
1998
This paper explores the limit of bulk (or partially-depleted SOI) CMOS scaling. A feasible design for 25 nm (channel length) CMOS… 
Highly Cited
1997
Highly Cited
1997
Random access magnetoresistive memories have been designed using anisotropic magnetoresistive (AMR) material and more recently… 
Highly Cited
1997
Highly Cited
1997
The surface structure of TiO 2~110! has been reexamined using scanning tunneling microscopy ~STM!, especially in terms of its… 
Highly Cited
1993
Highly Cited
1993
A new highly accurate and detailed intermolecular potential surface for Ar–H2O is derived by a direct nonlinear least squares fit… 
Highly Cited
1988
Highly Cited
1988
Abstract 
Highly Cited
1981
Highly Cited
1981
In this paper we report the results of model calculations of the nuclear potential surfaces of van der Waals complexes consisting…