Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,284 papers from all fields of science
Search
Sign In
Create Free Account
Interceptor pattern
Known as:
Interceptor
In the field of software development, an interceptor pattern is a software design pattern that is used when software systems or frameworks want to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Aspect-oriented programming
Intercepting filter pattern
Java Platform, Enterprise Edition
Software design pattern
Expand
Broader (1)
Concurrent computing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Programming the robot in tasks of inspection and interception
G. Alferov
,
O. Malafeyev
,
A. Maltseva
International Conference on Mechanics - Seventh…
2015
Corpus ID: 19932736
A pursuer ship - interceptor equipped with sonar, searches adversary submarine and it detected a submarine's periscope at a sea…
Expand
Highly Cited
2012
Highly Cited
2012
Conceptual design of a hypervelocity asteroid intercept vehicle (HAIV) and its flight validation mission
Alan Pitz
,
B. Kaplinger
,
G. Vardaxis
,
Tim Winkler
,
B. Wie
2012
Corpus ID: 371307
Highly Cited
2006
Highly Cited
2006
Recovery Policies for Enhancing Web Services Reliability
A. Erradi
,
P. Maheshwari
,
V. Tosic
IEEE International Conference on Web Services…
2006
Corpus ID: 1049373
Web services are gaining acceptance as a standards-based approach for integrating loosely coupled services often distributed over…
Expand
2003
2003
What happens when certainty equivalence is not valid?: Is there an optimal estimator for terminal guidance?
J. Shinar
,
V. Turetsky
Annual Reviews in Control
2003
Corpus ID: 142926
1995
1995
Waveform design and analysis of frequency hopping LPI networks
Robert F. Mills
,
G. E. Prescott
Proceedings of MILCOM '95
1995
Corpus ID: 62690541
The concept of a multiple access low-probability-of-intercept (LPI) network has generated considerable interest in the past few…
Expand
Highly Cited
1994
Highly Cited
1994
Connecting Mobile Workstations to the Internet Over a Digital Cellular Telephone Network
M. Kojo
,
K. Raatikainen
,
T. Alanko
Mobidata Workshops
1994
Corpus ID: 60562343
Modern portable computers and wireless connections over a cellular telephone network have created a new platform for distributed…
Expand
1986
1986
Experiments in software reliability: Life-critical applications
J. Dunham
IEEE Transactions on Software Engineering
1986
Corpus ID: 2870228
Digital computers are being used more frequently for process control applications in which the cost of system failure is high…
Expand
Highly Cited
1977
Highly Cited
1977
Monitoring the marine environment through sedimentation
A. Soutar
,
S. Kling
,
P. Crill
,
E. Duffrin
,
K. Bruland
Nature
1977
Corpus ID: 4149175
The argument is advanced that the interception of particles settling within the water column provides a means of monitoring and…
Expand
1977
1977
Performance Criteria for Spread Spectrum Communications
M. Ristenbatt
,
J. Daws
IEEE Transactions on Communications
1977
Corpus ID: 62540470
The criteria for antijam (AJ) and anti-intercept (AI) systems are described, in terms of the appropriate action taken by the…
Expand
Highly Cited
1963
Highly Cited
1963
A Study of the Quality of Sea Water Temperatures Reported in Logs of Ships' Weather Observations
J. Saur
1963
Corpus ID: 55963802
Abstract The differences between sea water temperature reported in the Log of Ship's Weather Observations and specially observed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE