Skip to search formSkip to main contentSkip to account menu

Piggybacking (security)

Known as: Piggybacking 
In security, piggybacking refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
For as prevalent as the devil is in our folklore and literature, it’s surprising that horror films are not the genre of choice… 
2009
2009
Prior work on HW support for memory race recording piggybacks time stamps on coherence messages and logs the outcome of memory… 
2008
2008
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure… 
2007
2007
Publish/subscribe model has become a prevalent paradigm for building distributed event delivering systems. Content-based publish… 
2003
2003
The running times of many computational science programs are now significantly greater than the mean-time-betweenfailures (MTBF… 
2003
2003
With a key component of latency on the Web being connection set up between clients and Web servers, several ways to avoid… 
2000
2000
The integration of batching and piggybacking in video servers subject to high loads is investigated. The look-ahead-maximize… 
Highly Cited
1996
Highly Cited
1996
A critical issue in the performance of a video-on-demand system is the I/O bandwidth required in order to satisfy client requests…