Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,505,273 papers from all fields of science
Search
Sign In
Create Free Account
Identity management
Known as:
Access and Identity Management
, ID management
, I&AM
Expand
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Authentication
Claims-based identity
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Theory and Experiment of a W-Band Tunable Gyrotron Oscillator
C. Du
,
X. Qi
,
+9 authors
Hu Wang
IEEE Transactions on Electron Devices
2014
Corpus ID: 10586487
A gyrotron capable of both frequency and power tuning is a promising coherent millimeter-THz wave source. A self-consistent…
Expand
2013
2013
Security and privacy mechanism for health internet of things
Kai Kang
,
Zhibo Pang
,
Cong Wang
2013
Corpus ID: 62630306
2013
2013
Improving HMM-Based Keyword Spotting with Character Language Models
Andreas Fischer
,
Volkmar Frinken
,
H. Bunke
,
C. Suen
IEEE International Conference on Document…
2013
Corpus ID: 17143689
Facing high error rates and slow recognition speed for full text transcription of unconstrained handwriting images, keyword…
Expand
2011
2011
A provisioning model towards OAuth 2.0 performance optimization
Moustafa Noureddine
,
R. Bashroush
International Conference on Computational…
2011
Corpus ID: 14220645
A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP…
Expand
2010
2010
A Novel Word Spotting Algorithm Using Bidirectional Long Short-Term Memory Neural Networks
Volkmar Frinken
,
Andreas Fischer
,
H. Bunke
IAPR International Workshop on Artificial Neural…
2010
Corpus ID: 40598353
Keyword spotting refers to the process of retrieving all instances of a given key word in a document. In the present paper, a…
Expand
Review
2010
Review
2010
Molecular hosts for triplet emitters in organic light-emitting diodes and the corresponding working principle
B. Mi
,
Zhiqiang Gao
,
Zhangjin Liao
,
Wei Huang
,
Chin H. Chen
2010
Corpus ID: 55100255
This paper summarizes the mechanism and routes for excitation of triplet emitters in dopant emission based phosphorescent organic…
Expand
2009
2009
Simple and effective techniques for core-region detection and slant correction in offline script recognition
A. Rehman
,
Dzulkifli Mohammad
,
G. Sulong
,
T. Saba
IEEE International Conference on Signal and Image…
2009
Corpus ID: 14498902
This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region…
Expand
2004
2004
Inference Methods for Autonomous Stochastic Linear Hybrid Systems
H. Balakrishnan
,
Inseok Hwang
,
J. Jang
,
C. Tomlin
International Conference on Hybrid Systems…
2004
Corpus ID: 11657310
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood…
Expand
2004
2004
Evolución de la mortalidad por enfermedad isquémica del corazón e infarto agudo del miocardio en Costa Rica, 1970-2001
M. R. Araya
,
S. G. Padilla
2004
Corpus ID: 73256830
OBJETIVO: Describir la evolucion epidemiologica de la mortalidad por enfermedades cardiovasculares (ECV), enfermedad isquemica…
Expand
1968
1968
Identity and Identity Diffusion
E. Erikson
1968
Corpus ID: 149395822
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE