Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,123,941 papers from all fields of science
Search
Sign In
Create Free Account
Identity management
Known as:
Access and Identity Management
, ID management
, I&AM
Expand
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Authentication
Claims-based identity
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Security and privacy mechanism for health internet of things
Kai Kang
,
Zhibo Pang
,
Cong Wang
2013
Corpus ID: 62630306
2013
2013
Improving HMM-Based Keyword Spotting with Character Language Models
Andreas Fischer
,
Volkmar Frinken
,
H. Bunke
,
C. Suen
IEEE International Conference on Document…
2013
Corpus ID: 17143689
Facing high error rates and slow recognition speed for full text transcription of unconstrained handwriting images, keyword…
Expand
Highly Cited
2012
Highly Cited
2012
Script Independent Word Spotting in Offline Handwritten Documents Based on Hidden Markov Models
S. Wshah
,
Manish Kumar
,
V. Govindaraju
International Conference on Frontiers in…
2012
Corpus ID: 37087652
Keyword spotting aims to retrieve all instances of a given keyword from a document in any language. In this paper, we propose a…
Expand
2011
2011
A provisioning model towards OAuth 2.0 performance optimization
Moustafa Noureddine
,
R. Bashroush
International Conference on Computational…
2011
Corpus ID: 14220645
A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP…
Expand
2010
2010
A Novel Word Spotting Algorithm Using Bidirectional Long Short-Term Memory Neural Networks
Volkmar Frinken
,
Andreas Fischer
,
H. Bunke
IAPR International Workshop on Artificial Neural…
2010
Corpus ID: 40598353
Keyword spotting refers to the process of retrieving all instances of a given key word in a document. In the present paper, a…
Expand
2009
2009
Simple and effective techniques for core-region detection and slant correction in offline script recognition
A. Rehman
,
Dzulkifli Mohammad
,
G. Sulong
,
T. Saba
IEEE International Conference on Signal and Image…
2009
Corpus ID: 14498902
This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region…
Expand
2008
2008
A simple segmentation approach for unconstrained cursive handwritten words in conjunction with neural network
Amjad Rehman Khan
,
D. Mohamad
2008
Corpus ID: 62917384
This paper presents a new, simple and fast approach for character segmentation of unconstrained handwritten words. The developed…
Expand
2006
2006
Rejection strategies for offline handwritten text line recognition
Roman Bertolami
,
Matthias Zimmermann
,
H. Bunke
Pattern Recognition Letters
2006
Corpus ID: 16812794
2004
2004
Inference Methods for Autonomous Stochastic Linear Hybrid Systems
H. Balakrishnan
,
Inseok Hwang
,
J. Jang
,
C. Tomlin
International Conference on Hybrid Systems…
2004
Corpus ID: 11657310
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood…
Expand
1968
1968
Identity and Identity Diffusion
E. Erikson
1968
Corpus ID: 149395822
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE