Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
30132 | 174 | 23.2 | 19% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
148 | 3 | COMPUTER SCIENCE, SOFTWARE ENGINEERING//COMPUTER SCIENCE, THEORY & METHODS//ACM SIGPLAN NOTICES | 63683 |
1913 | 2 | ACM SIGPLAN NOTICES//GARBAGE COLLECTION//REGISTER ALLOCATION | 5878 |
30132 | 1 | SINGLE ADDRESS SPACE//ACCESS RIGHT//PASSWORD CAPABILITY | 174 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | SINGLE ADDRESS SPACE | authKW | 1228439 | 4% | 100% | 7 |
2 | ACCESS RIGHT | authKW | 1184561 | 5% | 75% | 9 |
3 | PASSWORD CAPABILITY | authKW | 526474 | 2% | 100% | 3 |
4 | NON ROAD VEHICLES | authKW | 350983 | 1% | 100% | 2 |
5 | SYMMETRIC KEY CRYPTOGRAPHY | authKW | 337477 | 3% | 38% | 5 |
6 | SEMAPHORES | authKW | 255255 | 2% | 36% | 4 |
7 | 3 D IMAGE GENERATION | authKW | 175491 | 1% | 100% | 1 |
8 | ACCESS LISTS | authKW | 175491 | 1% | 100% | 1 |
9 | ACCESS PRIVILEGE | authKW | 175491 | 1% | 100% | 1 |
10 | ADAPTIVE BACKSTEPPING OBSERVER | authKW | 175491 | 1% | 100% | 1 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Hardware & Architecture | 6989 | 36% | 0% | 62 |
2 | Computer Science, Software Engineering | 3994 | 35% | 0% | 61 |
3 | Computer Science, Theory & Methods | 1947 | 29% | 0% | 51 |
4 | COMPUTER APPLICATIONS & CYBERNETICS | 1670 | 3% | 0% | 5 |
5 | Engineering, Electrical & Electronic | 510 | 33% | 0% | 57 |
6 | Computer Science, Information Systems | 384 | 13% | 0% | 22 |
7 | Engineering, General | 26 | 3% | 0% | 6 |
8 | Telecommunications | 20 | 3% | 0% | 6 |
9 | Materials Science, Textiles | 17 | 1% | 0% | 2 |
10 | Computer Science, Cybernetics | 5 | 1% | 0% | 1 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | BASE SCI FUNDAMENTALS DISBEF | 175491 | 1% | 100% | 1 |
2 | BASIC STAND COMP SCI TECHNOL | 175491 | 1% | 100% | 1 |
3 | BASIC STAND MATH COMP SCI | 175491 | 1% | 100% | 1 |
4 | CORP TECHNOL CT SE 2 | 175491 | 1% | 100% | 1 |
5 | DIPARTIMENTO INFORMAZ ELETTR INFORMAT TELECOMUNIC | 175491 | 1% | 100% | 1 |
6 | KATEDRA ENERGOELECT N EDOW ELEKTRYCZNYCH | 175491 | 1% | 100% | 1 |
7 | ENVIRONM PROTECT NAT ENERGY USE | 87745 | 1% | 50% | 1 |
8 | IKR | 87745 | 1% | 50% | 1 |
9 | KATEDRA AUTOMAT N EDU ELEKT | 87745 | 1% | 50% | 1 |
10 | SILNIKOW SPALINOWYCH TRANSPORTU | 87745 | 1% | 50% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | DESIGN NEWS | 41289 | 1% | 12% | 2 |
2 | SOFTWARE-PRACTICE & EXPERIENCE | 14565 | 8% | 1% | 14 |
3 | ELECTRONICS | 11240 | 3% | 1% | 5 |
4 | ELECTRONIC DESIGN | 8579 | 2% | 1% | 4 |
5 | EKSPLOATACJA I NIEZAWODNOSC-MAINTENANCE AND RELIABILITY | 7938 | 3% | 1% | 5 |
6 | MICROPROCESSORS AND MICROSYSTEMS | 6424 | 5% | 0% | 8 |
7 | ANGEWANDTE INFORMATIK | 6045 | 2% | 1% | 3 |
8 | COMPUTER JOURNAL | 5358 | 5% | 0% | 9 |
9 | IEEE MICRO | 5179 | 3% | 0% | 6 |
10 | INTERFACES IN COMPUTING | 5160 | 1% | 3% | 1 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | SINGLE ADDRESS SPACE | 1228439 | 4% | 100% | 7 | Search SINGLE+ADDRESS+SPACE | Search SINGLE+ADDRESS+SPACE |
2 | ACCESS RIGHT | 1184561 | 5% | 75% | 9 | Search ACCESS+RIGHT | Search ACCESS+RIGHT |
3 | PASSWORD CAPABILITY | 526474 | 2% | 100% | 3 | Search PASSWORD+CAPABILITY | Search PASSWORD+CAPABILITY |
4 | NON ROAD VEHICLES | 350983 | 1% | 100% | 2 | Search NON+ROAD+VEHICLES | Search NON+ROAD+VEHICLES |
5 | SYMMETRIC KEY CRYPTOGRAPHY | 337477 | 3% | 38% | 5 | Search SYMMETRIC+KEY+CRYPTOGRAPHY | Search SYMMETRIC+KEY+CRYPTOGRAPHY |
6 | SEMAPHORES | 255255 | 2% | 36% | 4 | Search SEMAPHORES | Search SEMAPHORES |
7 | 3 D IMAGE GENERATION | 175491 | 1% | 100% | 1 | Search 3+D+IMAGE+GENERATION | Search 3+D+IMAGE+GENERATION |
8 | ACCESS LISTS | 175491 | 1% | 100% | 1 | Search ACCESS+LISTS | Search ACCESS+LISTS |
9 | ACCESS PRIVILEGE | 175491 | 1% | 100% | 1 | Search ACCESS+PRIVILEGE | Search ACCESS+PRIVILEGE |
10 | ADAPTIVE BACKSTEPPING OBSERVER | 175491 | 1% | 100% | 1 | Search ADAPTIVE+BACKSTEPPING+OBSERVER | Search ADAPTIVE+BACKSTEPPING+OBSERVER |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | LOPRIORE, L , (2012) ENCRYPTED POINTERS IN PROTECTION SYSTEM DESIGN.COMPUTER JOURNAL. VOL. 55. ISSUE 4. P. 497 -507 | 10 | 83% | 0 |
2 | LOPRIORE, L , (2015) PASSWORD MANAGEMENT: DISTRIBUTION, REVIEW AND REVOCATION.COMPUTER JOURNAL. VOL. 58. ISSUE 10. P. 2557 -2566 | 9 | 82% | 0 |
3 | LOPRIORE, L , (2015) PASSWORD CAPABILITIES REVISITED.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 782 -791 | 8 | 80% | 0 |
4 | LOPRIORE, L , (2002) ACCESS PRIVILEGE MANAGEMENT IN PROTECTION SYSTEMS.INFORMATION AND SOFTWARE TECHNOLOGY. VOL. 44. ISSUE 9. P. 541 -549 | 8 | 89% | 1 |
5 | LOPRIORE, L , (2016) ACCESS CONTROL LISTS IN PASSWORD CAPABILITY ENVIRONMENTS.COMPUTERS & SECURITY. VOL. 62. ISSUE . P. 317 -327 | 8 | 57% | 0 |
6 | LOPRIORE, L , (2000) PROTECTION IN A SINGLE-ADDRESS-SPACE ENVIRONMENT.INFORMATION PROCESSING LETTERS. VOL. 76. ISSUE 1-2. P. 25 -32 | 7 | 100% | 0 |
7 | BARANOWSKI, J , (2012) TUNING OF STRONGLY DAMPED ANGULAR VELOCITY OBSERVERS.PRZEGLAD ELEKTROTECHNICZNY. VOL. 88. ISSUE 6. P. 181-187 | 5 | 100% | 0 |
8 | LOPRIORE, L , (2016) MEMORY PROTECTION IN EMBEDDED SYSTEMS.JOURNAL OF SYSTEMS ARCHITECTURE. VOL. 63. ISSUE . P. 61 -69 | 7 | 54% | 0 |
9 | LOPRIORE, L , (2013) OBJECT PROTECTION IN DISTRIBUTED SYSTEMS.JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING. VOL. 73. ISSUE 5. P. 570 -579 | 6 | 67% | 0 |
10 | DINI, G , LOPRIORE, L , (2015) PASSWORD SYSTEMS: DESIGN AND IMPLEMENTATION.COMPUTERS & ELECTRICAL ENGINEERING. VOL. 47. ISSUE . P. 318 -326 | 7 | 54% | 0 |
Classes with closest relation at Level 1 |