Skip to search formSkip to main content

Uninvited

Known as: Uninvited (computer game), Uninvited (game) 
Uninvited is a haunted house "point-and-click" adventure game developed originally for the Apple Macintosh by ICOM Simulations released in 1986 by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to the internet. The addition of these… Expand
  • figure 1
  • figure 2
Is this relevant?
2012
2012
As a result of recent international migration flows, the degree of ethnic diversity in most of the great European cities is quite… Expand
Is this relevant?
2012
2012
Next generation computing stared with the advent of Cloud computing. In cloud computing data possessor are goaded to farm out… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Brands rushed into social media, viewing social networks, video sharing, online communities, and microblogging sites as the… Expand
Is this relevant?
2006
2006
We use antibacterial soap to wash our hands, we swab doorknobs with antibacterial wipes, we pop antibiotics at the first sign of… Expand
Is this relevant?
2006
2006
This article explores whether vegetarianism is congruent with the alternative food economy. Although it has been largely… Expand
Is this relevant?
2003
2003
When large numbers of bacteria colonize the small intestine, a syndrome known as small intestinal bacterial overgrowth occurs… Expand
  • table 1
  • table 2
Is this relevant?
2002
2002
To investigate the relative importance of invited and uninvited applause, 15 speeches delivered by the leaders of the three… Expand
Is this relevant?
2000
2000
Statistical analysis of a large, phonetically transcribed corpus of spontaneous, American English dialogue suggests that an… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
Is this relevant?
1998
1998
In this paper, we present a history-based access-control mechanism that is suitable for mediating accesses from mobile code. The… Expand
  • figure 3
Is this relevant?