Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

World Wide Name

Known as: WWID, WWN 
A World Wide Name (WWN) or World Wide Identifier (WWID) is a unique identifier used in storage technologies including Fibre Channel, Advanced… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper presents a brain-inspired developmental architecture called Where-What Network (WWN). In this second version of WWN… Expand
2014
2014
Abstract The effects of ultrasound combined with ascorbic acid or glutathione on the inactivation of polyphenol oxidase (PPO) in… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
2013
2013
  • M. Solgi, J. Weng
  • The International Joint Conference on Neural…
  • 2013
  • Corpus ID: 18931297
Unsupervised feature learning has been shown promising in the field of machine learning. However, the learning algorithms used in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2012
2012
  • J. Weng, M. Luciw
  • IEEE Transactions on Autonomous Mental…
  • 2012
  • Corpus ID: 6092357
This is a theoretical, modeling, and algorithmic paper about the spatial aspect of brain-like information processing, modeled by… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2012
2012
Fong SSM, Cheung CKY, Ip JY, Chiu JHN, Lam KLH, Tsang WWN. Sport-specific balance ability in Taekwondo practitioners. J. Hum… Expand
  • table 1
  • table 2
2010
2010
  • Kajal Miyan, J. Weng
  • IEEE 9th International Conference on Development…
  • 2010
  • Corpus ID: 7535162
Based on some recent advances in understanding and modeling cortical processing for space [1] and time [2], we propose a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2010
2010
RESUMO O processo de escolha profissional nao e facil porque muitas angustias cercam a escolha de uma profissao. Este estudo… Expand
2009
2009
Intrusion detection (ID) technology is a very important means to improve network security, therefore intrusion detection system… Expand
  • table 2
  • figure 3
  • figure 4
2002
2002
The characteristics of geometry of slabs and the intraslab stress field in the Nankai subduction zone, Japan, were analyzed based… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2000
2000
This text focuses on a moment of failed political idealism, when leisure meant much more than fun. Between 1945 and 1961 the… Expand