Skip to search formSkip to main contentSkip to account menu

Identity management

Known as: Access and Identity Management, ID management, I&AM 
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Facing high error rates and slow recognition speed for full text transcription of unconstrained handwriting images, keyword… 
Highly Cited
2012
Highly Cited
2012
Keyword spotting aims to retrieve all instances of a given keyword from a document in any language. In this paper, we propose a… 
2011
2011
A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP… 
2010
2010
Keyword spotting refers to the process of retrieving all instances of a given key word in a document. In the present paper, a… 
2009
2009
This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region… 
2008
2008
This paper presents a new, simple and fast approach for character segmentation of unconstrained handwritten words. The developed… 
2004
2004
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood… 
1968
1968