Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Piggybacking (security)

Known as: Piggybacking 
In security, piggybacking refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
  • Z. Li, X. Zhu, +4 authors D. Oran
  • IEEE Journal on Selected Areas in Communications
  • 2014
  • Corpus ID: 8083792
Today, the technology for video streaming over the Internet is converging towards a paradigm named HTTP-based adaptive streaming… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Location-based applications have become increasingly popular on smartphones over the past years. The active use of these… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Abstract We implemented a program in which emission characterization is enabled through collaborations between academic, US and… Expand
  • figure 1
  • table 2
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We consider the problem of monitoring road and traffic conditions in a city. Prior work in this area has required the deployment… Expand
  • table 2
  • table 1
  • figure 3
  • table 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
What role can social networking Websites play in supporting large-scale group action and change? We are proposing to explore… Expand
  • figure 1
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Abstract—We show that mutual exchange of independentinformation between two nodes in a wireless network can be effi-ciently… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others… Expand
  • figure 1
  • table I
  • table II
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • S. More, J. Staddon
  • Proceedings IEEE Symposium on Security and…
  • 2001
  • Corpus ID: 15941490
We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Predictions of the geographic spread of introduced species are often limited by a lack of data on their mechanisms of dispersal… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A software distributed shared memory (DSM) system allows shared memory parallel programs to execute on networks of workstations… Expand
  • figure 2.9
  • figure 2.15
  • figure 3.2
  • figure 3.3
  • figure 3.4
Is this relevant?