Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Unique identifier

Known as: Unique Identifier(UID), Unique Object Identifier, Unique identifiers 
With reference to a given (possibly implicit) set of objects, a unique identifier (UID) is any identifier which is guaranteed to be unique among all… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Numerous research papers have listed different vectors of personally identifiable information leaking via tradition al and mobile… Expand
  • table 1
  • figure 8
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Using a large proprietary database of institutional trades, this paper examines the interim (intra-quarter) trading skills of… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
G protein βγ subunit-dependent signaling is important for chemoattractant-dependent leukocyte chemotaxis. Selective small… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper we present a detailed examination of identification codes, their embeddedness in everyday life, and how recent… Expand
  • table 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
E-mail-based identification and authentication is an emerging alternative to public-key infrastructure. It overcomes many… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general… Expand
  • figure 7
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A harmonic balance technique for modeling unsteady nonlinear e ows in turbomachinery is presented. The analysis exploits the fact… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1991
Highly Cited
1991
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?