Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,720,489 papers from all fields of science
Search
Sign In
Create Free Account
Wildcard character
Known as:
Wild-card symbol
, Star-dot-star
, *.*
Expand
In software, a wildcard character is a single character, such as an asterisk (*), used to represent a number of characters or an empty string. It is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Apache Cocoon
Automatic link establishment
C shell
CP/M
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Hybrid Cloud Service Selection Strategies: A Qualitative Meta-Analysis
K. Azumah
,
L. Sørensen
,
R. Tadayoni
International Conference on Awareness Science and…
2018
Corpus ID: 53079313
Hybrid cloud computing enjoys the benefits from the two worlds of private cloud and public cloud. The combination of the two…
Expand
2012
2012
An Automaton-Based Index Scheme for On-Demand XML Data Broadcast
Weiwei Sun
,
Peng Liu
,
Jingjing Wu
,
Yongrui Qin
,
Baihua Zheng
International Conference on Database Systems for…
2012
Corpus ID: 8317306
XML data broadcast is an efficient way to deliver semi-structured information in wireless mobile environment. In the literature…
Expand
Highly Cited
2009
Highly Cited
2009
Under the Hood
K. Calvert
,
M. Donahoo
2009
Corpus ID: 64289195
2009
2009
On subtyping, wildcards, and existential types
N. Cameron
,
S. Drossopoulou
FTfJP@ECOOP
2009
Corpus ID: 13944047
Wildcards are an often confusing part of the Java type system: the behaviour of wildcard types is not fully specified by…
Expand
2008
2008
Wildcards for lightweight information integration in virtual desktops
R. Stecher
,
C. Niederée
,
W. Nejdl
International Conference on Information and…
2008
Corpus ID: 1268052
We present a flexible information integration approach which addresses the dynamic integration needs in a personal desktop…
Expand
2008
2008
Generalised key delegation for hierarchical identity-based encryption
Michel Abdalla
,
Eike Kiltz
,
G. Neven
IET Information Security
2008
Corpus ID: 45472535
This paper introduces a new primitive called identity-based encryption with wildcard key derivation (WKD-IBE or 'wicked IBE…
Expand
2007
2007
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
J. Birkett
,
A. Dent
,
G. Neven
,
Jacob C. N. Schuldt
Australasian Conference on Information Security…
2007
Corpus ID: 7930808
We propose new instantiations of chosen-ciphertext secure of identity-based encryption schemes with wildcards (WIBE). Our schemes…
Expand
2003
2003
Covering Indexes for XML Queries: Bisimulation - Simulation = Negation
Prakash V. Ramanan
Very Large Data Bases Conference
2003
Corpus ID: 17422523
Highly Cited
2002
Highly Cited
2002
Process-Oriented, Flexible Composition of Web Services with UML
S. Thöne
,
Ralph Depke
,
G. Engels
International Conference on Conceptual Modeling
2002
Corpus ID: 2140620
The composition of elementary web services to larger-scale services has become an important means to enhance e-business…
Expand
2002
2002
Discovering Frequent Substructures from Hierarchical Semi-structured Data
G. Cong
,
Lan Yi
,
B. Liu
,
Ke Wang
SDM
2002
Corpus ID: 3022900
Frequent substructure discovery from a collection of semi-structured objects can serve for storage, browsing, querying, indexing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE