Skip to search formSkip to main contentSkip to account menu

Login

Known as: Signing in, Log in, Logged in 
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
As the growing interest of web recommendation systems those are applied to deliver customized data for their users, we started… 
2010
2010
The immense popularity of social network sites such as MySpace and Facebook has caused a significant shift in the way social… 
2008
2008
Decentralized voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster… 
Review
2007
Review
2007
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development… 
2005
2005
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
2002
2002
19 W ith computer security an increasing concern in many areas, researchers are working on a new approach to an old technology… 
Review
2001
Review
2001
This paper presents a study of FFT-implemented circular correlation and its application to fast direct acquisition of GPS codes…