Skip to search formSkip to main contentSkip to account menu

Login

Known as: Signing in, Log in, Logged in 
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Over the next few years the amount of biometric data being at the disposal of various agencies and authentication service… 
Highly Cited
2008
Highly Cited
2008
Field studies on Japanese macaques on Yakushima Island started in the mid-1970s, >25 yr after the emergence of Japanese… 
Review
2007
Review
2007
Lowland rainforests on Borneo are being degraded and lost at an alarming rate. Studies on mammals report species responding in… 
Review
2007
Review
2007
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
Highly Cited
1989
Highly Cited
1989
Harrington, T. C., Worrall, J. J., and Rizzo, D. M. 1989. Compatibility among host-specialized isolates of Heterobasidion annosum… 
Review
1979
Review
1979
-The EPR spectra of Fe3+ in the three ferroelectric phases of BaTi03 could be interpreted on the basis of the Newman… 
Highly Cited
1935
Highly Cited
1935
THE purpose of this letter is to point out an error in sign in Prof. A. Sommerfeld's original paper (1909) on the attenuation of…