Skip to search formSkip to main contentSkip to account menu

Login

Known as: Signing in, Log in, Logged in 
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
Field studies on Japanese macaques on Yakushima Island started in the mid-1970s, >25 yr after the emergence of Japanese… 
Review
2007
Review
2007
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development… 
Highly Cited
2003
Highly Cited
2003
Electromagnetic induction logging is one of the most important measurements in borehole characterization of an oil reservoir… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
2002
2002
In this experience paper we present a case study in using logic programming in a pervasive computing project in the healthcare… 
2001
2001
Multimedia applications and protocols are constantly being developed to run over the Internet. A new protocol or application… 
Highly Cited
1989
Highly Cited
1989
Harrington, T. C., Worrall, J. J., and Rizzo, D. M. 1989. Compatibility among host-specialized isolates of Heterobasidion annosum… 
Highly Cited
1935
Highly Cited
1935
THE purpose of this letter is to point out an error in sign in Prof. A. Sommerfeld's original paper (1909) on the attenuation of…