Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,399,168 papers from all fields of science
Search
Sign In
Create Free Account
Linux PAM
Known as:
PAM
Linux Pluggable Authentication Modules (PAM) provide dynamic authentication support for applications and services in a Linux or GNU/kFreeBSD system…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Keyring (cryptography)
Pluggable authentication module
Unix
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Invention through Form and Function Analogy.
Audrey C. Rule
2015
Corpus ID: 63605372
Invention through Form and Function Analogy is an invention book for teachers and other leaders working with youth who are…
Expand
2015
2015
Efficient techniques for multi-gigabits/s transmission over plastic optical fiber
Sher Ali Cheema
,
M. Wolf
,
Omer Tolay
,
M. Haardt
International Conference on Transparent Optical…
2015
Corpus ID: 14381200
Due to their dispersive nature, large core step index plastic optical fibers (SI-POF) suffer from a bandwidth limitation. At high…
Expand
2010
2010
A compact high directivity coupler with ±0.15dB error under VSWR 2.5∶1 for 3×3mm2 UMTS power amplifier modules
Yang Li
,
D. Prikhodko
,
+4 authors
Y. Tkachenko
IEEE Radio and Wireless Symposium
2010
Corpus ID: 13428126
This paper presents an approach to design high directivity couplers on compact multilayer power amplifier module (PAM). Coplanar…
Expand
2010
2010
Multi-mode WCDMA power amplifier module with improved low-power efficiency using stage-bypass
G. Hau
,
Mahendra Singh
IEEE Radio Frequency Integrated Circuits…
2010
Corpus ID: 17103299
This paper presents a multi-mode power amplifier (PA) with very low DC quiescent current and current consumption under large…
Expand
2007
2007
HSN-PAM: Finding Hierarchical Probabilistic Groups from Large-Scale Networks
Lin Zhou
,
Y. Liu
,
Jing Wang
,
Yong Shi
Seventh IEEE International Conference on Data…
2007
Corpus ID: 15470308
Real-world social networks are often hierarchical, re- flecting the fact that some communities are composed of a few smaller, sub…
Expand
2007
2007
Towards an African ICT e-Index: Towards evidence based ICT policy in Africa
Alison Gillwald and Christoph Stork
2007
Corpus ID: 150772734
Augustin Chabossou (Benin), Sebusang Sebusang (Botswana), Pam Zahonogo (Burkina Faso), Olivier Nana Nzèpa (Cameroon), Arsene…
Expand
2005
2005
Performance analysis of differential receivers with quaternary modulation for UWB transmissions
M. Renzo
,
F. Graziosi
,
Alessandro Rea
,
F. Santucci
GLOBECOM '05. IEEE Global Telecommunications…
2005
Corpus ID: 29540618
This paper proposes an investigation of binary and quaternary modulation schemes for ultra wide band systems using differential…
Expand
2005
2005
Using of clustering algorithm CWSP-PAM for rural network planning
L. F. Ibrahim
International Conference in IT & Application
2005
Corpus ID: 7629962
Network planning is of key importance during the construction of new communities and cities, in which telephone and data services…
Expand
2004
2004
Design of low-density parity-check (LDPC) codes for high order constellations
H. Sankar
,
N. Sindhushayana
,
K. Narayanan
IEEE Global Telecommunications Conference…
2004
Corpus ID: 5178624
In this paper, we propose a simple design of LDPC codes which combines the good properties of multilevel coding (MLC) and bit…
Expand
1990
1990
On the capacity of a twisted-wire pair: peak-power constraint
S. Shitz
IEEE Transactions on Communications
1990
Corpus ID: 206407870
The capacity of a twisted-pair channel (TPC) with a peak-power constraint imposed on the transmitted signal is considered. Bounds…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required