Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

pkg-config

Known as: Pkgconfig 
pkg-config is a computer program that provides a unified interface for querying installed libraries for the purpose of compiling software from its… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Self-Organising Networks (SON) was introduced by the next Generation Mobile Networks (NGMN) in 4G/LTE networks to automate… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 6
Is this relevant?
2017
2017
Recent computing systems consume more than several hundred watts of power and a robust PDN design is critical to minimize power… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2017
2017
In proxy re-encrytpion (PRE) scheme, the message is sent by a delegator to a delegatee with a help of the trusted third party… Expand
  • table 1
Is this relevant?
2016
2016
Cloud computing makes it easy for people to share files anywhere and anytime with mobile end devices. There is a privacy issue in… Expand
Is this relevant?
2014
2014
Koroner arter hastalığının tedavisinde revaskülarizasyon yöntemi olarak kullanılan perkütan koroner girişimlerde (PKG) uygulama… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A novel silicon interposer (SilP) BGA package (PKG) - SilP PKG - has been developed and qualified through test chip. It features… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 4
  • figure 5
Is this relevant?
2008
2008
For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2007
2007
The androgen-secreting Leydig cells produce cGMP, but the pathways responsible for generation, degradation, and actions of this… Expand
Is this relevant?
2005
2005
A mobile virtual private network (VPN) has been developed to secure a mobile user's communication between entrusted external… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2002
2002
From the Publisher: A comprehensive, code-intensive guide to building commercial-quality peer-to-peer applications with JXTA and… Expand
  • figure 1.1
  • figure 1.3
  • figure 1.2
  • figure 1.4
  • figure 1.5
Is this relevant?