Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,055,569 papers from all fields of science
Search
Sign In
Create Free Account
Unique identifier
Known as:
Unique Identifier(UID)
, Unique Object Identifier
, Unique identifiers
With reference to a given (possibly implicit) set of objects, a unique identifier (UID) is any identifier which is guaranteed to be unique among all…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Affinity analysis
ChemSpider
Direct TPMS
Electronic Product Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
De-anonymization Attack on Geolocated Data
S. Gambs
,
M. Killijian
,
Miguel Núñez del Prado Cortez
12th IEEE International Conference on Trust…
2013
Corpus ID: 14703689
With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy…
Expand
Highly Cited
2011
Highly Cited
2011
Privacy leakage vs . Protection measures : the growing disconnect
B. Krishnamurthy
2011
Corpus ID: 15298526
Numerous research papers have listed different vectors of personally identifiable information leaking via traditional and mobile…
Expand
Highly Cited
2008
Highly Cited
2008
Small Molecule Disruption of G Protein βγ Subunit Signaling Inhibits Neutrophil Chemotaxis and Inflammation
D. Lehmann
,
A. Seneviratne
,
A. Smrcka
Molecular Pharmacology
2008
Corpus ID: 28467917
G protein βγ subunit-dependent signaling is important for chemoattractant-dependent leukocyte chemotaxis. Selective small…
Expand
Highly Cited
2007
Highly Cited
2007
FPGA Intrinsic PUFs and Their Use for IP Protection
J. Guajardo
,
Sandeep S. Kumar
,
G. Schrijen
,
P. Tuyls
Workshop on Cryptographic Hardware and Embedded…
2007
Corpus ID: 15544862
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and…
Expand
Highly Cited
2005
Highly Cited
2005
Numerical predictions of low Reynolds number flows over two tandem circular cylinders
Bruce Sharman
,
F. Lien
,
L. Davidson
,
C. Norberg
2005
Corpus ID: 55399963
Flows over two tandem cylinders were analysed using the newly developed collocated unstructured computational fluid dynamics…
Expand
Highly Cited
2003
Highly Cited
2003
Email-Based Identification and Authentication: An Alternative to PKI?
S. Garfinkel
IEEE Security and Privacy
2003
Corpus ID: 5986817
E-mail-based identification and authentication is an emerging alternative to public-key infrastructure. It overcomes many…
Expand
Highly Cited
2003
Highly Cited
2003
Peer-to-Peer Systems II
M. Feldman
,
Shelley Zhuang
,
F. Dabek
,
B. Zhao
,
P. Druschel
,
J. Kubiatowicz
Lecture Notes in Computer Science
2003
Corpus ID: 42085720
Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general…
Expand
Highly Cited
2002
Highly Cited
2002
Computation of Unsteady Nonlinear Flows in Cascades Using a Harmonic Balance Technique
K. Hall
,
Jeffrey P. Thomas
,
W. S. Clark
2002
Corpus ID: 15499718
A harmonic balance technique for modeling unsteady nonlinear e ows in turbomachinery is presented. The analysis exploits the fact…
Expand
Highly Cited
2000
Highly Cited
2000
The OSU Flow-tools Package and CISCO NetFlow Logs
S. Romig
,
M. Fullmer
,
R. Luman
LiSA
2000
Corpus ID: 14018719
Many Cisco routers and switches support NetFlow services which provides a detailed source of data about network traffic. The…
Expand
Highly Cited
2000
Highly Cited
2000
VIBRATION OF A FLEXIBLE PIPE CONVEYING VISCOUS PULSATING FLUID FLOW
D. Gorman
,
J. Reese
,
Y. L. Zhang
2000
Corpus ID: 55245752
Abstract The non-linear equations of motion of a flexible pipe conveying unsteadily flowing fluid are derived from the continuity…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE