Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,035,533 papers from all fields of science
Search
Sign In
Create Free Account
Central Equipment Identity Register
Known as:
CEIR
A Central Equipment Identity Register is a database of the IMEI numbers of blacklisted handsets. If a device's ESN or IMEI number is listed on a CEIR…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Blacklist (computing)
Brick (electronics)
Broader (1)
Mobile security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Comparing CEIR for RGB Images Using Color Histogram Quantization with Euclidean and Bhattachatyya Distance Asha
A. Karegowda
,
Shilpa Bhat
,
N. Dhanlakshmi
2018
Corpus ID: 132710584
2017
2017
Bartering for ‘Free’ Information: Implications for Measured GDP and Productivity
Rachel H. Soloveichik
2017
Corpus ID: 160017422
‘Free’ information from the Internet is ubiquitous. While some of this information is supported by advertising revenue, and thus…
Expand
Review
2016
Review
2016
Analysing Central Equipment Identity Register (CEIR) Model for Mobile Handset Tracking in India
Prof.Yatin Jog
,
Pushpendra Thenuan
,
Dhruv Khanna
,
Ashlesha Chavan
2016
Corpus ID: 113363133
There are 980 Million wireless subscriber with 12 Telecom Service provider (TSPs) in India as on Sept 2015. Each TSP has their…
Expand
2016
2016
Roberto: Un ejercicio de diagnóstico relacional a través del OPD-2
Semíramis Cortés Prieto
2016
Corpus ID: 184647003
CeIR Vol. 10 (3) – Octubre 2016 ISSN 1988-2939 – www.ceir.info © Derechos reservados/Copyright de Clínica e investigación…
Expand
2015
2015
O’r Gymru ‘Ddu’ i’r Ddalen ‘Wen’ : Darllen Amlddiwylliannedd ac Aralledd o’r Newydd yn Ffuglen Gyfoes De Cymru, er 1990
L. Sheppard
2015
Corpus ID: 190712493
Mae’r traethawd hwn yn archwilio’r portread o amlddiwylliannedd yn ne Cymru a geir mewn ffuglen Gymraeg a Saesneg er 1990. Trwy…
Expand
2015
2015
General requirements and security architecture for mobile phone anti-cloning measures
I. Gepko
EUROCON Conference
2015
Corpus ID: 17939042
The impressive number of counterfeit and stolen mobile phones as well as the emergence of applications where the authentication…
Expand
2011
2011
Determining the Optimal Capacity for the MICE Industry in Las Vegas
Li-Ting Yang
,
Zheng Gu
2011
Corpus ID: 11395038
The meetings, incentive travel, conventions, and exhibitions (MICE) industry is a comparatively young industry and there has been…
Expand
2007
2007
RELIGIOUS DIALOGUE AND TOLERANCE – THEORETICAL AND PRACTICAL EXPERIENCES OF DIFFERENCES AND SIMILARITIES
Zoran Matevski
Politics and Religion Journal
2007
Corpus ID: 148434663
At the beginning we’ll emphasize doubtless fact that religion and nation are two powerful forms of identifi cation. These are…
Expand
Review
2007
Review
2007
Branch and bound, integer, and non-integer programming
John J. H. Forrest
,
J. Tomlin
Annals of Operations Research
2007
Corpus ID: 15266569
In this note we review the development of the first commercial branch and bound codes at CEIR/Scicon, with particular emphasis on…
Expand
1978
1978
Competency Evaluation in Rehabilitation (CEIR): Rehabilitation Counseling Competencies. Michigan Studies in Rehabilitation, Series 1, Monograph II.
D. K. Harrison
1978
Corpus ID: 68194719
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE