Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,840 papers from all fields of science
Search
Sign In
Create Free Account
Login
Known as:
Signing in
, Log in
, Logged in
Expand
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Access token
Active Directory
Authentication
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
How land-use and urban form impact bicycle flows : Evidence from the bicycle-sharing system ( BIXI ) in
2014
Corpus ID: 4668406
2013
2013
A Hybrid Web Recommendation System based on the Improved Association Rule Mining Algorithm
Ujwala Wanaskar
,
Sheetal Vij
,
Debajyoti Mukhopadhyay
arXiv.org
2013
Corpus ID: 5623972
As the growing interest of web recommendation systems those are applied to deliver customized data for their users, we started…
Expand
2010
2010
Randoms in my bedroom: Negotiating privacy and unsolicited contact on social network sites
B. Robards
2010
Corpus ID: 3911537
The immense popularity of social network sites such as MySpace and Facebook has caused a significant shift in the way social…
Expand
2008
2008
P2PNS: A Secure Distributed Name Service for P2PSIP
Ingmar Baumgart
Annual IEEE International Conference on Pervasive…
2008
Corpus ID: 7900563
Decentralized voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster…
Expand
Review
2007
Review
2007
A Second Life for Your Museum: 3D Multi-User Virtual Environments and Museums
R. Urban
2007
Corpus ID: 60016010
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development…
Expand
2005
2005
Security Requirements---A Field Study of Current Practice
John Wilander
,
Jens Gustavsson
2005
Corpus ID: 8833422
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in…
Expand
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
2002
2002
Taking a graphical approach to the password
L. Paulson
Computer
2002
Corpus ID: 17578601
19 W ith computer security an increasing concern in many areas, researchers are working on a new approach to an old technology…
Expand
Review
2001
Review
2001
FFT Acquisition of Periodic, Aperiodic, Puncture, and Overlaid Code Sequences in GPS
Chun Yang
2001
Corpus ID: 44771254
This paper presents a study of FFT-implemented circular correlation and its application to fast direct acquisition of GPS codes…
Expand
1996
1996
Ecology and logging in a tropical rain forest in Guyana: with recommendations for forest management.
H. Steege
,
R. Boot
,
+16 authors
R. Zagt
1996
Corpus ID: 129032127
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE