Passwd

Known as: Passwd (command), Shadow (file), Passwd (file) 
passwd is a tool on most Unix and Unix-like operating systems used to change a user's password. The password entered by the user is run through a key… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1969-2017
05101519692017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Using device-to-device communications as an underlay for cellular communications will provide an exciting opportunity to increase… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2013
2013
As an emerging technique with a promising application prospect, the device-free localization (DFL) technique has drawn… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We examine two privacy controls for Android smartphones that empower users to run permission-hungry applications while protecting… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
By using an onboard camera, it is possible to detect the free road surface ahead of the ego-vehicle. Road detection is of high… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Mean-shift is an effective algorithm for object tracking. However, it has a poor performance when the illumination condition… (More)
  • figure 1
  • table 1
  • table III
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper presents propagation measurements in the presence of human activity for a 60 GHz channel. Series of 40-min-long… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • table III
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Placing shadows is difficult task since shadows depend on the relative positions of lights and objects in an unintuitive manner… (More)
Is this relevant?
1999
1999
Since the suppression of J/ψ’s has been proposed by Matsui and Satz as a signal for a quark-gluon plasma formation more than a… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Computing systems have been under increasingly sophisticated attack over the Internet and by using dial-up access ports. One form… (More)
Is this relevant?
1991
1991
The technique of placing directed line segments at grid points, known as hedgehogging, has been used for some time as a tool for… (More)
Is this relevant?