Skip to search formSkip to main contentSkip to account menu

Identity management

Known as: Access and Identity Management, ID management, I&AM 
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Facing high error rates and slow recognition speed for full text transcription of unconstrained handwriting images, keyword… 
2011
2011
A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP… 
2010
2010
Keyword spotting refers to the process of retrieving all instances of a given key word in a document. In the present paper, a… 
Review
2010
Review
2010
This paper summarizes the mechanism and routes for excitation of triplet emitters in dopant emission based phosphorescent organic… 
2009
2009
This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region… 
2007
2007
Integrated asset management (IAM) is the vision of IT- enabled transformation of oilfield operations where information… 
2004
2004
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood… 
1986
1986
3H-labeled rRNA was prepared from Acinetobacter calcoaceticus ATCC 23055Tand hybridized with filter-fixed DNA from carefully… 
1968
1968