Skip to search formSkip to main contentSkip to account menu

Tunneling protocol

Known as: SSH tunnel, Secure Shell tunneling, SSH tunneling 
In computer networks, a tunneling protocol allows a network user to access or provide a network service that the underlying network does not support… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Signal-to-noise ratio (SNR) is a valuable figure of merit in determining the operating scope of infrared detectors. Antenna… 
Highly Cited
1999
Highly Cited
1999
The atomic arrangement of the technologically important As-rich GaAs 001 2 3 4 reconstructed surface is determined using bias… 
Highly Cited
1999
Highly Cited
1999
We identify fundamental mechanisms of electron escape from self-organized InAs quantum dots ~QD’s! in a vertical electric field… 
Highly Cited
1999
Highly Cited
1999
Angel Rubio,1,* Daniel Sanchez-Portal,2 Emilio Artacho,2 Pablo Ordejon,3 and Jose M. Soler2 1Departamento de Fisica Teorica… 
Highly Cited
1999
Highly Cited
1999
We demonstrate that, there is an optimum reverse body bias, unique to any technology generation, that minimizes the standby… 
Highly Cited
1997
Highly Cited
1997
  • Yuan TaurE. Nowak
  • 1997
  • Corpus ID: 35663536
Issues, challenges, and potential directions for further performance gains beyond 0.1 /spl mu/m CMOS are explored. Gate oxide… 
Highly Cited
1993
Highly Cited
1993
A new highly accurate and detailed intermolecular potential surface for Ar–H2O is derived by a direct nonlinear least squares fit… 
Highly Cited
1991
Highly Cited
1990
Highly Cited
1990
Amorphous materials at low temperature have markedly different physical and thermal properties from crystals.' For example, the… 
Highly Cited
1981
Highly Cited
1981
In this paper we report the results of model calculations of the nuclear potential surfaces of van der Waals complexes consisting…