Piggybacking (security)

Known as: Piggybacking 
In security, piggybacking refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Over the past decade, the number of studies that investigate aerosol–cloud interactions has increased considerably. Although… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Today, the technology for video streaming over the Internet is converging towards a paradigm named HTTP-based adaptive streaming… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Duty-cycling technique has been widely adopted in MAC protocols for wireless sensor networks to conserve energy. However, low… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Performant execution of data-parallel jobs needs good execution plans. Certain properties of the code, the data, and the… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
MapReduce is emerging as a generic parallel programming paradigm for large clusters of machines. This trend combined with the… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others… (More)
  • figure 1
  • table I
  • table II
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Several distributed peer-to-peer applications require weakly-consistent knowledgeof processgroupmember ship information at all… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Predictions of the geographic spread of introduced species are often limited by a lack of data on their mechanisms of dispersal… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A software distributed shared memory (DSM) system allows shared memory parallel programs to execute on networks of workstations… (More)
  • figure 2.9
  • figure 2.15
  • figure 3.2
  • figure 3.3
  • figure 3.4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Recent technology advances have made multimedia on-demand services, such as home entertainment and home-shopping, important to… (More)
  • figure 16
Is this relevant?