Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,352,486 papers from all fields of science
Search
Sign In
Create Free Account
Wily
Known as:
Wily (disambiguation)
Wily is a text editor created by Gary Capell for Unix computer systems. It is based on Acme, the mouse-centric editing environment for the Plan 9…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Acme
Computer mouse
Mouse chording
Operating system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Will China's Development lead to Mexico's Underdevelopment?
K. Schwartzman
2015
Corpus ID: 155486693
China has become an important global actor in the arenas of production, trade, and foreign investment. In 1948, China contributed…
Expand
2012
2012
Catching the Wily Hacker: A multilayer deception system
Wei Wang
,
Jeffrey Bickford
,
I. Murynets
,
Ramesh Subbaraman
,
Andrea G. Forte
,
Gokul Singaraju
IEEE Sarnoff Symposium
2012
Corpus ID: 8905284
In recent years, enterprises have been facing a growing number of highly customized attacks using sophisticated techniques that…
Expand
2010
2010
Coiterative Morphisms: Interactive Equational Reasoning for Bisimulation, using Coalgebras
M. Niqui
2010
Corpus ID: 18217151
htmlabstractter: SEN 3 Abstract: We study several techniques for interactive equational reasoning with the bisimulation…
Expand
2008
2008
Live Baiting for Service-Level DoS Attackers
S. Khattab
,
Sameh Gobriel
,
R. Melhem
,
D. Mossé
IEEE INFOCOM - The 27th Conference on Computer…
2008
Corpus ID: 8795464
Denial-of-service (DoS) attacks remain a challenging problem in the Internet. By making resources unavailable to intended…
Expand
2007
2007
Emerging Problems of Urban Regeneration in the Multiply Deprived Area of Bijlmermeer, Amsterdam
K. Leeming
,
T. Shakur
2007
Corpus ID: 128967705
Within the European Union there are a number of different approaches taken when tackling the regeneration of areas with multiple…
Expand
2006
2006
Serving Text-Mining Functionalities with the Software Architecture Plato
J. Adeva
International Conference on Computational…
2006
Corpus ID: 11802523
As information systems are dealing with a growing amount of unstructured text information, text mining technologies and their…
Expand
Review
2005
Review
2005
Collusion issue in video watermarking
G. Doërr
,
J. Dugelay
IS&T/SPIE Electronic Imaging
2005
Corpus ID: 14996015
Digital watermarking has first been introduced as a possible way to ensure intellectual property (IP) protection. However…
Expand
2003
2003
A log analysis based intrusion detection system for the creation of a specification based intrusion prevention system
Andre Muscat
2003
Corpus ID: 7017534
We propose a novel Intrusion Prevention System (IPS) which would base its knowledge and operation on a higher level of…
Expand
2002
2002
Eukaryotic checkpoints are absent in the cell division cycle ofEntamoeba histolytica
Sulagna Banerjee
,
Suchismita Das
,
A. Lohia
Journal of Biosciences
2002
Corpus ID: 12847340
Fidelity in transmission of genetic characters is ensured by the faithful duplication of the genome, followed by equal…
Expand
Highly Cited
1997
Highly Cited
1997
A mind is a wonderful thing to waste: “think like a commodity”, become a CPA
T. Tinker
,
Athina Koutsoumadi
1997
Corpus ID: 15130380
Technical excess in accounting education has always been a source of discontent among educational reformers, however, two recent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE