Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,450,540 papers from all fields of science
Search
Sign In
Create Free Account
Login
Known as:
Signing in
, Log in
, Logged in
Expand
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Access token
Active Directory
Authentication
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
History and Present Scope of Field Studies on Macaca fuscata yakui at Yakushima Island, Japan
J. Yamagiwa
International journal of primatology
2008
Corpus ID: 27141377
Field studies on Japanese macaques on Yakushima Island started in the mid-1970s, >25 yr after the emergence of Japanese…
Expand
Review
2007
Review
2007
A Second Life for Your Museum: 3D Multi-User Virtual Environments and Museums
R. Urban
2007
Corpus ID: 60016010
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development…
Expand
Highly Cited
2003
Highly Cited
2003
Applications of the BCGS-FFT method to 3-D induction well logging problems
Zhong Qing Zhang
,
Q. Liu
IEEE Transactions on Geoscience and Remote…
2003
Corpus ID: 13252101
Electromagnetic induction logging is one of the most important measurements in borehole characterization of an oil reservoir…
Expand
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
2002
2002
Using Logic Programming to Detect Activities in Pervasive Healthcare
H. Christensen
International Conference on Logic Programming
2002
Corpus ID: 18436852
In this experience paper we present a case study in using logic programming in a pervasive computing project in the healthcare…
Expand
2001
2001
ENDE: An End-to-end Network Delay Emulator Tool for Multimedia Protocol Development
I. Yeom
,
A. Reddy
Multimedia tools and applications
2001
Corpus ID: 8233441
Multimedia applications and protocols are constantly being developed to run over the Internet. A new protocol or application…
Expand
Highly Cited
1990
Highly Cited
1990
The role of the mating sign in honey bees, Apis mellifera L.: does it hinder or promote multiple mating?
G. Koeniger
Animal Behaviour
1990
Corpus ID: 53169449
Highly Cited
1989
Highly Cited
1989
Compatibility Among Host-Specialized Isolates of Heterobasidion annosum from Western North America
T. Harrington
,
J. Worrall
,
D. Rizzo
1989
Corpus ID: 2783254
Harrington, T. C., Worrall, J. J., and Rizzo, D. M. 1989. Compatibility among host-specialized isolates of Heterobasidion annosum…
Expand
Highly Cited
1985
Highly Cited
1985
Primary sensory projections from the labella to the brain of Drosophila melanogaster Meigen (Diptera : Drosophilidae)
Shubha V. Nayak
,
R. N. Singh
1985
Corpus ID: 85220006
Highly Cited
1935
Highly Cited
1935
Propagation of Radio Waves over a Plane Earth
K. Norton
Nature
1935
Corpus ID: 4129255
THE purpose of this letter is to point out an error in sign in Prof. A. Sommerfeld's original paper (1909) on the attenuation of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE