Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,575 papers from all fields of science
Search
Sign In
Create Free Account
Login
Known as:
Signing in
, Log in
, Logged in
Expand
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Access token
Active Directory
Authentication
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
How land-use and urban form impact bicycle flows : Evidence from the bicycle-sharing system ( BIXI ) in
2014
Corpus ID: 4668406
2013
2013
A Hybrid Web Recommendation System based on the Improved Association Rule Mining Algorithm
Ujwala Wanaskar
,
Sheetal Vij
,
Debajyoti Mukhopadhyay
arXiv.org
2013
Corpus ID: 5623972
As the growing interest of web recommendation systems those are applied to deliver customized data for their users, we started…
Expand
2013
2013
Measurement and Analysis of an Internet Streaming Service to Mobile Devices
Yao Liu
,
Fei Li
,
Lei Guo
,
Bo Shen
,
Songqing Chen
,
Yingjie Lan
IEEE Transactions on Parallel and Distributed…
2013
Corpus ID: 359892
Receiving Internet streaming services on various mobile devices is getting increasingly popular, and cloud platforms have also…
Expand
2010
2010
Randoms in my bedroom: Negotiating privacy and unsolicited contact on social network sites
B. Robards
2010
Corpus ID: 3911537
The immense popularity of social network sites such as MySpace and Facebook has caused a significant shift in the way social…
Expand
Review
2007
Review
2007
A Second Life for Your Museum: 3D Multi-User Virtual Environments and Museums
R. Urban
2007
Corpus ID: 60016010
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development…
Expand
2005
2005
Security Requirements---A Field Study of Current Practice
John Wilander
,
Jens Gustavsson
2005
Corpus ID: 8833422
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in…
Expand
2002
2002
Taking a graphical approach to the password
L. Paulson
Computer
2002
Corpus ID: 17578601
19 W ith computer security an increasing concern in many areas, researchers are working on a new approach to an old technology…
Expand
Review
2001
Review
2001
FFT Acquisition of Periodic, Aperiodic, Puncture, and Overlaid Code Sequences in GPS
Chun Yang
2001
Corpus ID: 44771254
This paper presents a study of FFT-implemented circular correlation and its application to fast direct acquisition of GPS codes…
Expand
1985
1985
Comparison of the orientation effect of SiO2- and Si3N4-encapsulated GaAs MESFET's
T. Ohnishi
,
T. Onodera
,
N. Yokoyama
,
H. Nishi
IEEE Electron Device Letters
1985
Corpus ID: 34811277
This letter compares the influence of stressed-SiO<inf>2</inf>and Si<inf>3</inf>N<inf>4</inf>films on threshold voltage of WSi…
Expand
1983
1983
Tree species regeneration after logging in temperate rainforest, Tasmania
S. Calais
,
J. Kirkpatrick
1983
Corpus ID: 130116822
Selective mechanized logging for Athrotaxis selaginoides in temperate rainforest south of Rosebery in western Tasmania has…
Expand