Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,206,950 papers from all fields of science
Search
Sign In
Create Free Account
Fibre Channel Logins
In the Login process different operational parameters are exchanged: * FC-PH version support * Classes of service supported * Frame size * Type of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Buffer credits
Fibre Channel
Fibre Channel time-out values
NPIV
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Analysis of internet voting in India
Vaibhav Pratap Singh
,
Haribabu Pasupuleti
,
N. S. C. Babu
International Conference on Innovations in…
2017
Corpus ID: 10794290
Internet voting can further boost democratic setups by facilitating voting from anywhere around the world. It provides a solution…
Expand
2016
2016
On security level usage in context-aware role-based access control
Michal Trnka
,
T. Cerný
ACM Symposium on Applied Computing
2016
Corpus ID: 14867081
Huge contemporary trend is adding context awareness into software applications. It allows both better user experience as well as…
Expand
2014
2014
Color Pass: An intelligent user interface to resist shoulder surfing attack
Nilesh Chakraborty
,
S. Mondal
Proceedings of the IEEE Students' Technology…
2014
Corpus ID: 42629585
Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the…
Expand
2010
2010
MULTIMODAL BIOMETRICS BASED AUTHENTICATION AGAINST DICTIONARY ATTACKS
P.Tamil Selvi
,
N.Radha
2010
Corpus ID: 14697678
The Multimodal Biometric based user authentication systems are highly secured and efficient to use and place total trust on the…
Expand
2010
2010
Presence verification for summative e-assessments
Kikelomo Maria Apampa
2010
Corpus ID: 35259377
Influenced by information technology advances, the assessment process has begun to make its way out of the traditional classroom…
Expand
2010
2010
The Research and Implemention of Device Login in FC-2 of Fibre Channel
Bei Liu
,
Yuejian Fang
,
Zhonghai Wu
First International Conference on Networking and…
2010
Corpus ID: 30909266
This paper introduces Fibre Channel about its layers, topologies and class services. Emphasis is placed on the discussion of…
Expand
Review
2008
Review
2008
Modeling of login procedure for wireless application with interaction overview diagrams
V. Plavsic
,
Emil Secerov
Computer Science and Information Systems
2008
Corpus ID: 14854963
In this paper we describe in details UML modeling of login procedure, which is a part of UserBarCodeReader application, developed…
Expand
2008
2008
Wearable authentication device for transparent login in nomadic applications environment
Sampo Ojala
,
Jari Keinänen
,
J. Skyttä
Australian Workshop on Safety Critical Systems…
2008
Corpus ID: 9322337
This paper describes a wearable authentication device for continuous user authentication and transparent login procedure in…
Expand
2006
2006
Continuous Authentication by Keystroke Dynamics Using Committee Machines
S. R. D. L. E. S. Filho
,
M. Roisenberg
Intelligence and Security Informatics
2006
Corpus ID: 43304113
Current authentication mechanisms have a barely addressed problem: they only authenticate a user at the login procedure. If a…
Expand
2000
2000
Individualized special education with cognitive skill assessment
Jaakko Kurhila
,
Teija Laine
British Journal of Educational Technology
2000
Corpus ID: 39575662
Ahmed is a learning environment which—in addition to supporting openness in learning materials and adaptivity in learning events…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE