Skip to search formSkip to main contentSkip to account menu

User identifier

Known as: Userid, Real userid, Real user ID 
Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID. The UID… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
In LTE, establishing a connection requires a relatively complex handshaking procedure. Such an approach is suitable for a system… 
2013
2013
Social networks are an example of complex systems consisting of nodes that can interact with each other and based on these… 
2010
2010
Personalized search, navigation and content delivery techniques have attracted interest in the recommender systems as a means to… 
2009
2009
When investigators are faced with a target system, they want to find sensitive information such as userID and password… 
Highly Cited
2007
Highly Cited
2007
It is well known that Keystroke Dynamics can be used as a biometric to authenticate users. But most work to date use fixed… 
Review
2004
Review
2004
: We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively… 
2002
2002
DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an… 
Review
1999
Review
1999
Over the past several years, many college and university faculty have developed courses or course components for delivery to…