Skip to search formSkip to main contentSkip to account menu

Login

Known as: Signing in, Log in, Logged in 
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
As the growing interest of web recommendation systems those are applied to deliver customized data for their users, we started… 
2013
2013
Receiving Internet streaming services on various mobile devices is getting increasingly popular, and cloud platforms have also… 
2010
2010
The immense popularity of social network sites such as MySpace and Facebook has caused a significant shift in the way social… 
Review
2007
Review
2007
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development… 
2005
2005
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in… 
2002
2002
19 W ith computer security an increasing concern in many areas, researchers are working on a new approach to an old technology… 
Review
2001
Review
2001
This paper presents a study of FFT-implemented circular correlation and its application to fast direct acquisition of GPS codes… 
1985
1985
This letter compares the influence of stressed-SiO<inf>2</inf>and Si<inf>3</inf>N<inf>4</inf>films on threshold voltage of WSi… 
1983
1983
Selective mechanized logging for Athrotaxis selaginoides in temperate rainforest south of Rosebery in western Tasmania has…