Skip to search formSkip to main contentSkip to account menu

Login

Known as: Signing in, Log in, Logged in 
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Recently, since the cloud computing is developed, many companies have provided various services using it. DaaS(Desktop as a… 
Review
2007
Review
2007
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development… 
2007
2007
This study presents a learning behavior diagnosis system to study students' learning status from learning portfolios. The… 
2003
2003
Mosses and hepatics (bryophytes) are the most diverse and abundant understorey vegetation within the Coastal Western Hemlock (CWH… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
2002
2002
In this experience paper we present a case study in using logic programming in a pervasive computing project in the healthcare… 
1999
1999
In this final of three related articles about smart card technology, the authors discuss the JavaCard, a much-hyped technology…