Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,979,026 papers from all fields of science
Search
Sign In
Create Free Account
User identifier
Known as:
Userid
, Real userid
, Real user ID
Expand
Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID. The UID…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
16-bit
32-bit
Chmod
Data source name
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Compressive sensing for MTC in new LTE uplink multi-user random access channel
Y. Beyene
,
Christopher Boyd
,
K. Ruttik
,
C. Bockelmann
,
O. Tirkkonen
,
R. Jäntti
IEEE Region 8 Conference AFRICON
2015
Corpus ID: 38780705
In LTE, establishing a connection requires a relatively complex handshaking procedure. Such an approach is suitable for a system…
Expand
2013
2013
Creation and growth of online social network
Katarzyna Musial
,
M. Budka
,
K. Juszczyszyn
World wide web (Bussum)
2013
Corpus ID: 14836288
Social networks are an example of complex systems consisting of nodes that can interact with each other and based on these…
Expand
2011
2011
Authentication of Students and Students’ Work in E-Learning : Report for the Development Bid of Academic Year 2010/11
Hannan Xiao
,
Wei Ji
2011
Corpus ID: 152606616
2010
2010
Toward ontology-based personalization of a recommender system in social network
H. Kadima
,
M. Malek
International Conference of Soft Computing and…
2010
Corpus ID: 6555424
Personalized search, navigation and content delivery techniques have attracted interest in the recommender systems as a means to…
Expand
2009
2009
Collecting Sensitive Information from Windows Physical Memory
Qiang Zhao
,
Tianjie Cao
Journal of Computers
2009
Corpus ID: 18303090
When investigators are faced with a target system, they want to find sensitive information such as userID and password…
Expand
Review
2007
Review
2007
Failover, load sharing and server architecture in SIP telephony
Kundan Singh
,
H. Schulzrinne
Computer Communications
2007
Corpus ID: 5914927
Highly Cited
2007
Highly Cited
2007
Keystroke Dynamics in a General Setting
R. Janakiraman
,
T. Sim
International Conference on Biometrics
2007
Corpus ID: 10703982
It is well known that Keystroke Dynamics can be used as a biometric to authenticate users. But most work to date use fixed…
Expand
Review
2004
Review
2004
Failover and Load Sharing in SIP Telephony
Kundan Singh
,
H. Schulzrinne
2004
Corpus ID: 6306743
: We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively…
Expand
2002
2002
The secure DHCP system with user authentication
Tadashi Komori
,
Takamichi Saito
27th Annual IEEE Conference on Local Computer…
2002
Corpus ID: 12781935
DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an…
Expand
Review
1999
Review
1999
Untangling a tangled web: an overview of web-based instruction programs
S. Fredrickson
1999
Corpus ID: 60491679
Over the past several years, many college and university faculty have developed courses or course components for delivery to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required