Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,220,049 papers from all fields of science
Search
Sign In
Create Free Account
Login
Known as:
Signing in
, Log in
, Logged in
Expand
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Access token
Active Directory
Authentication
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The Evaluations of Desktop as a Service in an Educational Cloud
S. Kibe
,
Teruaki Koyama
,
M. Uehara
International Conference on Network-Based…
2012
Corpus ID: 17781275
Recently, since the cloud computing is developed, many companies have provided various services using it. DaaS(Desktop as a…
Expand
Review
2007
Review
2007
A Second Life for Your Museum: 3D Multi-User Virtual Environments and Museums
R. Urban
2007
Corpus ID: 60016010
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development…
Expand
2007
2007
Learning Log Explorer in E-Learning Diagnosis
B. Jong
,
T. Chan
,
Yu Lung Wu
IEEE Transactions on Education
2007
Corpus ID: 40654386
This study presents a learning behavior diagnosis system to study students' learning status from learning portfolios. The…
Expand
2003
2003
Patterns of bryophyte diversity in humid coastal and inland cedar- hemlock forests of British Columbia 1
S. Newmaster
,
R. Belland
,
A. Arsenault
,
D. Vitt
2003
Corpus ID: 53355108
Mosses and hepatics (bryophytes) are the most diverse and abundant understorey vegetation within the Coastal Western Hemlock (CWH…
Expand
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
2002
2002
Using Logic Programming to Detect Activities in Pervasive Healthcare
H. Christensen
International Conference on Logic Programming
2002
Corpus ID: 18436852
In this experience paper we present a case study in using logic programming in a pervasive computing project in the healthcare…
Expand
1999
1999
JavaCard-from hype to reality
M. Baentsch
,
P. Buhler
,
T. Eirich
,
Frank Höring
,
M. Oestreicher
IEEE Concurrency
1999
Corpus ID: 11925683
In this final of three related articles about smart card technology, the authors discuss the JavaCard, a much-hyped technology…
Expand
1996
1996
Ecology and logging in a tropical rain forest in Guyana: with recommendations for forest management.
H. Steege
,
R. Boot
,
+16 authors
R. Zagt
1996
Corpus ID: 129032127
Highly Cited
1990
Highly Cited
1990
The role of the mating sign in honey bees, Apis mellifera L.: does it hinder or promote multiple mating?
G. Koeniger
Animal Behaviour
1990
Corpus ID: 53169449
Highly Cited
1985
Highly Cited
1985
Primary sensory projections from the labella to the brain of Drosophila melanogaster Meigen (Diptera : Drosophilidae)
Shubha V. Nayak
,
R. N. Singh
1985
Corpus ID: 85220006
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE