Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,536 papers from all fields of science
Search
Sign In
Create Free Account
Unbundled network element
Known as:
UNE
, UNE-P
Unbundled network elements (UNEs) are a requirement mandated by the United States Telecommunications Act of 1996. They are the parts of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
End-to-end principle
Leased line
Optical fiber
Product bundling
Expand
Broader (1)
Local loop
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
The structure of approximate groups
E. Breuillard
,
B. Green
,
T. Tao
Publications mathématiques (Bures-sur-Yvette)
2011
Corpus ID: 119603959
Let K⩾1 be a parameter. A K-approximate group is a finite set A in a (local) group which contains the identity, is symmetric, and…
Expand
Review
2008
Review
2008
Allelopathy—An update
E. L. Rice
The Botanical review
2008
Corpus ID: 9175428
SummaryThe latest previous comprehensive review of allelopathy (Rice, 1974) covered research done primarily prior to 1973. There…
Expand
Highly Cited
2007
Highly Cited
2007
Pour une littérature-monde
M. Bris
,
J. Rouaud
,
Eva Almassy
2007
Corpus ID: 160221142
Highly Cited
2003
Highly Cited
2003
Optimized Link State Routing Protocol (OLSR)
T. Clausen
,
P. Jacquet
Request for Comments
2003
Corpus ID: 44711941
This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an…
Expand
Highly Cited
2002
Highly Cited
2002
On Choosing and Bounding Probability Metrics
Alison L Gibbs
,
F. Su
2002
Corpus ID: 613752
When studying convergence of measures, an important issue is the choice of probability metric. We provide a summary and some new…
Expand
Highly Cited
2000
Highly Cited
2000
A revised taxonomy for intrusion-detection systems
Hervé Debar
,
M. Dacier
,
A. Wespi
Ann. des Télécommunications
2000
Corpus ID: 5509109
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or in general against information…
Expand
Highly Cited
1986
Highly Cited
1986
Seed plant phylogeny and the origin of angiosperms: An experimental cladistic approach
J. Doyle
,
M. Donoghue
The Botanical review
1986
Corpus ID: 44844947
We present a numerical cladistic (parsimony) analysis of seed plants plus progymnosperms, using characters from all parts of the…
Expand
Highly Cited
1983
Highly Cited
1983
Zeros d’un champ de vecteurs et classes caracteristiques equivariantes
N. Berline
,
M. Vergne
1983
Corpus ID: 118892372
Introduction, Soit M une variété différentiable, munie d'une action d'un groupe de Lie T. Soit t l'algèbre de Lie de T. Dans [2…
Expand
Highly Cited
1973
Highly Cited
1973
ESSAI SUR UNE APPLICATION DES REGLES DE MAXIMIS ET MINIMIS A QUELQUES PROBLEMES DE STATIQUE RELATIFS A L'ARCHITECTURE (ESSAY ON MAXIMUMS AND MINIMUMS OF RULES TO SOME STATIC PROBLEMS RELATING TO…
C. Coulomb
1973
Corpus ID: 114083856
Highly Cited
1973
Highly Cited
1973
UNE METHODE DE MESURE DE LA DENSITE APPARENTE DE PETITS AGGLOMERATS TERREUX - APPLICATION A L'ANALYSE DES SYSTEMES DE POROSITE DU SOL.
G. Monnier
,
P. Stengel
,
J. Fies
1973
Corpus ID: 169044313
L'ANALYSE DE LA POROSITE HETEROGENE DU SOL EN PLACE NECESSITE LA MESURE DE LA DENSITE APPARENTE SUR PETITS AGGLOMERATS. UNE…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE