Skip to search formSkip to main contentSkip to account menu

Identity management

Known as: Access and Identity Management, ID management, I&AM 
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A gyrotron capable of both frequency and power tuning is a promising coherent millimeter-THz wave source. A self-consistent… 
2013
2013
Facing high error rates and slow recognition speed for full text transcription of unconstrained handwriting images, keyword… 
2011
2011
A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP… 
2010
2010
Keyword spotting refers to the process of retrieving all instances of a given key word in a document. In the present paper, a… 
Review
2010
Review
2010
This paper summarizes the mechanism and routes for excitation of triplet emitters in dopant emission based phosphorescent organic… 
2009
2009
This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region… 
2004
2004
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood… 
2004
2004
OBJETIVO: Describir la evolucion epidemiologica de la mortalidad por enfermedades cardiovasculares (ECV), enfermedad isquemica… 
1968
1968