Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,132,476 papers from all fields of science
Search
Sign In
Create Free Account
IBM Tivoli Access Manager
Known as:
TAM
IBM Tivoli Access Manager (TAM) is an authentication and authorization solution for corporate web services, operating systems, and existing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Application Response Measurement
Authentication
Authorization
IBM Tivoli Identity Manager
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Applying Technology Acceptance (TAM) model to determine the acceptance of Nursing Information System (NIS) for Computer Generated Nursing Care Plan among nurses
Babu Dharmarajan
,
D. Gangadharan
2013
Corpus ID: 212591845
Background: An advance in the development of information technology and the performance standards in the healthcare systems…
Expand
2013
2013
A comparison of non-nested models in explaining teachers' intention to use technology
T. Teo
British Journal of Educational Technology
2013
Corpus ID: 31595044
Technology acceptance is posited to be influenced by a variety of factors, including individual differences, social influences…
Expand
Review
2012
Review
2012
RETRACTED: Risk control allocation model for pressure vessels and piping project
C. Tseng
,
Cheng-Wu Chen
,
K. F. Liu
2012
Corpus ID: 110878872
In 2013 the Editor of Journal of Vibration and Control and SAGE became aware of a peer review ring involving assumed and…
Expand
Highly Cited
2008
Highly Cited
2008
Calix[n]arene sulfonic acids bearing pendant aliphatic chains as recyclable surfactant-type Brønsted acid catalysts for allylic alkylation with allyl alcohols in water
Yu-Liang Liu
,
Li Liu
,
Yilin Wang
,
Yu Han
,
Dong Wang
,
Yong-Jun Chen
2008
Corpus ID: 93345207
Calix[n]arene sulfonic acids bearing pendant aliphatic chains were developed as surfactant-type Bronsted acid catalysts for…
Expand
Review
2008
Review
2008
The LX—M relation of clusters of galaxies
E. Rykoff
,
A. Evrard
,
+8 authors
Risa Wechsler
2008
Corpus ID: 879317
We present a new measurement of the scaling relation between X-ray luminosity and total mass for 17,000 galaxy clusters in the…
Expand
Highly Cited
2005
Highly Cited
2005
Test planning for modular testing of hierarchical SOCs
K. Chakrabarty
,
V. Iyengar
,
M. Krasniewski
IEEE Transactions on Computer-Aided Design of…
2005
Corpus ID: 6465247
Multilevel test access mechanism (TAM) optimization is necessary for modular testing of hierarchical systems-on-chip (SOCs) that…
Expand
Highly Cited
2004
Highly Cited
2004
Technology factors in corporate adoption of mobile cell phones: a case study analysis
G. Roberts
,
J. Pick
37th Annual Hawaii International Conference on…
2004
Corpus ID: 12542930
This paper studies the technology factors that companies consider important in deciding to adopt and deploy wireless devices…
Expand
Review
2002
Review
2002
Exploring cultural differences as a means for understanding the global mobile Internet: a theoretical basis and program of research
Andrew Urbaczewski
,
John D. Wells
,
Suprateek Sarker
,
Matti Koivisto
Proceedings of the Annual Hawaii International…
2002
Corpus ID: 17822911
Sets forth a program of research for identifying the pertinent issues that are affecting the adoption and use of mobile…
Expand
Highly Cited
2000
Highly Cited
2000
An ILP formulation to optimize test access mechanism in system-on-chip testing
M. Nourani
,
C. Papachristou
Proceedings International Test Conference (IEEE…
2000
Corpus ID: 8195490
We present an optimization method that complies with IEEE P1500 draft standard and deals with modeling and design of the test…
Expand
Highly Cited
1993
Highly Cited
1993
A Multithreaded Implementation of Id using P-RISC Graphs
R. Nikhil
International Workshop on Languages and Compilers…
1993
Corpus ID: 40443048
P-RISC graphs are parallel, structured, executable control-flow graphs that model locality properties of distributed memory…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE