Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,052,323 papers from all fields of science
Search
Sign In
Create Free Account
Centralized computing
Centralized computing is computing done at a central location, using terminals that are attached to a central computer. The computer itself may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Cathode ray tube
Client–server model
Communications protocol
Computer file
Expand
Broader (1)
Cloud computing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Power Station Flue Gas Desulfurization System Based on Automatic Online Monitoring Platform
Xin Liu
,
Chengyu Ma
,
Xueyong Yang
,
Chongyang Yang
,
Y. Diao
2015
Corpus ID: 54582119
SO 2 and NOx are important components of atmospheric pollutants produced by coal combustion pro- cess and significant emissions…
Expand
Highly Cited
2010
Highly Cited
2010
Jena Research Papers in Business and Economics Optimally Routing and Scheduling Tow Trains for JIT-Supply of Mixed-Model Assembly Lines
N. Boysen
2010
Corpus ID: 14264961
In recent years, more and more automobile producers adopted the supermarketconcept to enable a exible and reliable Just-in-Time…
Expand
Review
2009
Review
2009
Complex Event Processing
A. Buchmann
,
B. Koldehofe
it - Information Technology
2009
Corpus ID: 13437361
Complex Event Processing (CEP) has evolved into the paradigm of choice for the development of monitoring and reactive…
Expand
Highly Cited
2009
Highly Cited
2009
Downlink power control in co-channel macrocell femtocell overlay
Xiangfang Li
,
Lijun Qian
,
D. Kataria
Annual Conference on Information Sciences and…
2009
Corpus ID: 7199415
In this paper, interference mitigation through downlink power control is considered for Macrocell Femtocell overlay. Specifically…
Expand
Highly Cited
2007
Highly Cited
2007
SKYPEER: Efficient Subspace Skyline Computation over Distributed Data
A. Vlachou
,
C. Doulkeridis
,
Y. Kotidis
,
M. Vazirgiannis
IEEE International Conference on Data Engineering
2007
Corpus ID: 14555487
Skyline query processing has received considerable attention in the recent past. Mainly, the skyline query is used to find a set…
Expand
Highly Cited
2006
Highly Cited
2006
Cooperative regions and partner choice in coded Cooperative systems
Zinan Lin
,
E. Erkip
,
A. Stefanov
IEEE Transactions on Communications
2006
Corpus ID: 1751026
User cooperation is an efficient approach to obtain diversity in both centralized and distributed wireless networks. In this…
Expand
Highly Cited
2004
Highly Cited
2004
Collapsar: A VM-Based Architecture for Network Attack Detention Center
Xuxian Jiang
,
Dongyan Xu
USENIX Security Symposium
2004
Corpus ID: 5883342
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though…
Expand
Review
1996
Review
1996
Allocating fair rates for available bit rate service in ATM networks
A. Arulambalam
,
Xiaoqiang Chen
,
N. Ansari
IEEE Communications Magazine
1996
Corpus ID: 62718340
A central issue in congestion control for the available bit rate (ABR) service in ATM networks is the computation of the fair…
Expand
Highly Cited
1994
Highly Cited
1994
Adaptive receiver structures for asynchronous CDMA systems
P. Rapajic
,
B. Vucetic
IEEE J. Sel. Areas Commun.
1994
Corpus ID: 11312681
Adaptive linear and decision feedback receiver structures for coherent demodulation in asynchronous code division multiple access…
Expand
Highly Cited
1991
Highly Cited
1991
System Architecture for a Large Scale Video on Demand Service
W.D Sincoskie
Comput. Networks ISDN Syst.
1991
Corpus ID: 45084031
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE