Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,000,377 papers from all fields of science
Search
Sign In
Create Free Account
Type-in program
Known as:
Type-in game
, Type in programs
, Type-in listing
Expand
A type-in program, type-in game or just type-in, is a computer program listing of source code printed in a computer magazine or book, meant to be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
16-bit
32-bit
8-bit
Acorn Electron
Expand
Broader (1)
History of software
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Two Way Mobile Authentication Security Mechanisms for an Enterprise System
J. AyangbekunOluwafemi
,
O. A. Sunday
,
Shoewu Oluwagbemiga
2018
Corpus ID: 173988893
Over a decade and more importantly since the advent of Internet technology, security issue has become a thing of great necessity…
Expand
2014
2014
Job Listing Form
Andrew D. Patrick
2014
Corpus ID: 168600500
2014
2014
Near-miss software clones in open source games: An empirical study
Yaowen Chen
,
I. Keivanloo
,
C. Roy
Canadian Conference on Electrical and Computer…
2014
Corpus ID: 3047552
Developers tend to reuse source code by copy/paste. This form of reuse introduces code clones to software systems. Cloning in…
Expand
Review
2013
Review
2013
Performance Evaluation on Simplified Computer for the Elderly People
Jeichen Hsieh
,
Chang-Chan Huang
Seventh International Conference on Innovative…
2013
Corpus ID: 8295089
Simplified computers become more important than ever before in our modern life. However, this new-form computer actually has many…
Expand
Review
2007
Review
2007
Inherited eye disease–diagnosis and management, 2nd edition, by Saul Merin
B. Lorenz
,
M. Preising
Graefe's Archive for Clinical and Experimental…
2007
Corpus ID: 1872523
This classic textbook in ophthalmology has been updated! Once again, Saul Merin has provided a wonderful compilation of reports…
Expand
Review
2007
Review
2007
Theories and Techniques in Computational Morphology
K. N. Murthy
2007
Corpus ID: 16682900
In this paper we first present an overview of theories and techniques in Computational Morphology. We then give a brief sketch of…
Expand
2002
2002
Efficient combination of type-in and wizard-of-oz tests in speech interface development process
Saija Lemmelä
,
P. Boda
Interspeech
2002
Corpus ID: 17712879
Effective methods and tools are needed for designing, developing and testing speech-enabled applications. Traditional methods…
Expand
Review
1997
Review
1997
Further Cognitive Research on the Schools and Staffing Survey (SASS) Teacher Listing Form. Working Paper Series.
A. Zukerberg
,
Meredith Lee
1997
Corpus ID: 141664870
Review
1989
Review
1989
The influence of contract type in program execution/V-22 OSPREY: a case study.
Daniel R. Smith
1989
Corpus ID: 109773910
Abstract : The purpose of this study was to look at the impact of a fixed price type contract on program execution of a major…
Expand
1983
1983
Secure device pairing under realistic conditions
Olivier Courtay
,
Olivier Heen
,
M. Karroumi
,
A. Durand
1983
Corpus ID: 11741430
Creating a trust relationship between two devices is commonly designated as pairing protocol. This practice is essential for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE