Auswahl der wissenschaftlichen Literatur zum Thema „Incumbent User Privacy“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Incumbent User Privacy" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Incumbent User Privacy"

1

Milanović, Nemanja, Miloš Milosavljević, Slađana Benković, Dušan Starčević und Željko Spasenić. „An Acceptance Approach for Novel Technologies in Car Insurance“. Sustainability 12, Nr. 24 (10.12.2020): 10331. http://dx.doi.org/10.3390/su122410331.

Der volle Inhalt der Quelle
Annotation:
Background: Unlike other financial services, technology-driven changes in the insurance industry have not been a vastly explored topic in scholarly literature. Incumbent insurance companies have hitherto been holding their positions using the complexity of the product, heavy regulation, and gigantic balance sheets as paramount factors for a relatively slow digitalization and technological transformation. However, new technologies such as car telematic devices have been creating a new insurance ecosystem. The aim of this study is to assess the telematics technology acceptance for insurance purposes. Methods: The study is based on the Unified Theory of Acceptance and Use of Technology (UTAUT). By interviewing 502 new car buyers, we tested the factors that affect the potential usage of telematic devices for insurance purposes. Results: The results indicate that facilitating conditions are the main predictor of telematics use. Moreover, privacy concerns related to the potential abuse of driving behavior data play an important role in technology acceptance. Conclusions: Although novel insurance technologies are mainly presented as user-driven, users (drivers and insurance buyers) are often neglected as an active party in the development of such technologies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mahdavi, Paasha. „Explaining the Oil Advantage: Effects of Natural Resource Wealth on Incumbent Reelection in Iran“. World Politics 67, Nr. 2 (10.02.2015): 226–67. http://dx.doi.org/10.1017/s0043887114000392.

Der volle Inhalt der Quelle
Annotation:
Why does natural resource wealth prolong incumbency? Using evidence from parliamentary elections in the Islamic Republic of Iran, the author shows that natural resource revenues boost incumbent reelection rates because they are used to provide public or private goods to constituents, which incentivizes voters to reelect incumbents over challengers. To test this hypothesis, the author employs originally assembled data on five parliamentary elections in Iran (1992–2008) in longitudinal hierarchical regression analyses at the district and province levels. By leveraging Iran's mixed-member electoral system, he shows that the resource-incumbency mechanism works primarily in single-member districts with little evidence of an incumbency advantage for politicians in resource-rich multimember districts. Building on the rentier theory of natural resource wealth, the results suggest that voting for the incumbent is attributable to patronage and public goods distribution. The findings offer new insights into the understudied context of Iranian legislative elections, illustrate the mechanisms driving the relationship between resource wealth and incumbency advantage at the subnational level in a nondemocratic setting, and highlight the mediating effects of electoral institutions on the resource-incumbency relationship.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Avenburg, Alejandro. „Public Costs versus Private Gain: Assessing the Effect of Different Types of Information about Corruption Incidents on Electoral Accountability“. Journal of Politics in Latin America 11, Nr. 1 (April 2019): 71–108. http://dx.doi.org/10.1177/1866802x19840457.

Der volle Inhalt der Quelle
Annotation:
Are voters’ attitudes towards corrupt candidates affected by the details they learn about candidates’ wrongdoing? This study examines the effect of including different pieces of information emphasising the public costs or private gain of a similar corruption incident on the probability of support for the incumbent mayor’s re-election. I use three surveys experiments with online convenience samples of Brazilian subjects. The survey experiments use various vignettes presenting a fictitious Brazilian incumbent mayor with antecedents of misuse of public funds, running for re-election. I manipulate the details that subjects learn on those antecedents to assess whether information on the public costs of the corruption incident or on the candidate’s illicit enrichment stimulates a stronger rejection. Additional manipulations are used to test rival hypotheses. Results consistently show that information showing the candidate’s illicit enrichment drives a stronger negative response than every alternative treatment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sutton, Teresa. „Advowsons and Private Patronage“. Ecclesiastical Law Journal 21, Nr. 3 (September 2019): 267–88. http://dx.doi.org/10.1017/s0956618x19000681.

Der volle Inhalt der Quelle
Annotation:
This article focuses on the role of private patronage within the Church of England. Private patrons own advowsons. These property rights can no longer be traded but may still be bequeathed or transferred without value. When there is a vacancy in a benefice, a patron has the right to nominate a new incumbent in accordance with the Patronage (Benefices) Measure 1986. This article uses contemporary and historical records to define private patronage and analyse the current role of the four broad categories of private patrons: private individuals, educational bodies, guilds and patronage societies. While acknowledging the benefits that patronage can bring, this article advocates substantive reform for the future including a sunset rule for private individual patronage. The article suggests that reform of the law of private patronage will make a positive contribution to other contemporary issues before the Church by promoting diversity in vocations, facilitating necessary pastoral reorganisation and adding to the dialogue about the future of the parish system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Anand, Manoj, und Jagandeep Singh. „AGR Challenge for Bharti Airtel and Vodafone Idea“. Vision: The Journal of Business Perspective 25, Nr. 2 (16.05.2021): 233–55. http://dx.doi.org/10.1177/0972262921991932.

Der volle Inhalt der Quelle
Annotation:
In 2018, India had 1.2 billion subscribers, and it was the second largest telecommunications market in the world. The industry had witnessed the emergence, ascendency, and dominance of private sector players during the last two decades. The telecom sector was characterized by a growing wireless user base and Internet subscriber base. The dwindling average revenue per user (ARPU) in the mobile telephony segment and the declining average cost to subscriber per GB of data were manifestations of the intense rivalry in the sector which had led to price wars among incumbent players. The Supreme Court of India’s judgement on Adjusted Gross Revenue (AGR) in October 2019 obligated the industry players to pay ₹1,470 billion as payment towards their licence fee and spectrum usage charges. Vodafone Idea and Bharti Airtel, two leading players, collectively owed 60% of the aforementioned liability. Declining revenue had already squeezed the profitability and liquidity of these companies. The AGR liability augmented their challenges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Guijarro, Luis, Vicent Pla, Jose R. Vidal und Jorge Martinez-Bauset. „Entry, Competition, and Regulation in Cognitive Radio Scenarios: A Simple Game Theory Model“. Mathematical Problems in Engineering 2012 (2012): 1–13. http://dx.doi.org/10.1155/2012/620972.

Der volle Inhalt der Quelle
Annotation:
Spectrum management based on private commons is argued to be a realistic scenario for cognitive radio deployment within the current mobile market structure. A scenario is proposed where a secondary entrant operator leases spectrum from a primary incumbent operator. The secondary operator innovates incorporating cognitive radio technology, and it competes in quality of service and price against the primary operator in order to provide service to users. We aim to assess which benefit users get from the entry of secondary operators in the market. A game theory-based model for analyzing both the competition between operators and the subscription decision by users is proposed. We conclude that an entrant operator adopting an innovative technology is better off entering the market, and that a regulatory authority should intervene first allowing the entrant operator to enter the market and then setting a maximum amount of spectrum leased. This regulatory intervention is justified in terms of users utility and social welfare.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Njapau, Georginah, und John Luangala. „Learning to Read in English in Different Environments: A Case of Selected Schools in Lusaka and Mufulira Districts“. Journal of Law and Social Sciences 2, Nr. 1 (27.01.2021): 69–85. http://dx.doi.org/10.53974/unza.jlss.2.1.433.

Der volle Inhalt der Quelle
Annotation:
This study mainly focused on learning to Read in English in Differing Environments. Selected public and private schools in Lusaka and Mufulira urban districts in Zambia were targeted, with a population of all Grade 3 learners, totaling 150. Reading tests, semi-guided interviews, focus group discussions and a check list for lesson observation were done. A qualitative approach was used to probe and to get deep insights of how reading in English was taught. The qualitative data was analysed through the identification of teachers' common themes, descriptions and experiences. Conclusions were reached and analysed with reference to the research questions. Quantitative data was analysed using a t-test to compare the reading levels between learners in public basic and private schools. The findings indicate that learners in private schools have a conducive environment for learning how to read in English. The study found that public basic schools do not use the recommended PRP. Public schools did not have enough teaching and learning materials. It was established that learners in public schools did not read according to their reading levels while learners in private schools did that effectively. The recommendations were that the Ministry of Education needed to provide enough equipment and materials, and train teachers appropriately as well as early out regular inspection exercises. In the same way, it was incumbent on the school authorities to cooperate with parents.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Allen, Pauline, Simon Turner, Will Bartlett, Virginie Perotin, Greenwell Matchaya und Bernarda Zamora. „Provider Diversity in the English NHS: A Study of Recent Developments in Four Local Health Economies“. Journal of Health Services Research & Policy 17, Nr. 1_suppl (Januar 2012): 23–30. http://dx.doi.org/10.1258/jhsrp.2011.011015.

Der volle Inhalt der Quelle
Annotation:
Objectives To assess the impact of provider diversity on quality and innovation in the English NHS by mapping the extent of diverse provider activity and identifying the differences in performance between Third Sector Organisations (TSOs), for-profit private enterprises, and incumbent organizations within the NHS, and the factors that affect the entry and growth of new providers. Methods Case studies of four local health economies. Data included: semi-structured interviews with 48 managerial and clinical staff from NHS organizations and providers from the private and third sector; some documentary evidence; a focus group with service users; and routine data from the Care Quality Commission and Companies House. Data collection was mainly between November 2008 and November 2009. Results Involvement of diverse providers in the NHS is limited. Commissioners' local strategies influence degrees of diversity. Barriers to entry for TSOs include lack of economies of scale in the bidding process. Private providers have greater concern to improve patient pathways and patient experience, whereas TSOs deliver quality improvements by using a more holistic approach and a greater degree of community involvement. Entry of new providers drives NHS trusts to respond by making improvements. Information sharing diminishes as competition intensifies. Conclusions There is scope to increase the participation of diverse providers in the NHS but care must be taken not to damage public accountability, overall productivity, equity and NHS providers (especially acute hospitals, which are likely to remain in the NHS) in the process.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Olander, Petrus. „Economic Diversification and Institutional Quality—Issues of Concentrated Interests“. Studies in Comparative International Development 54, Nr. 3 (September 2019): 346–64. http://dx.doi.org/10.1007/s12116-019-09287-0.

Der volle Inhalt der Quelle
Annotation:
Abstract Recent research has provided broad accounts of what high institutional quality is; bureaucrats should be impartial and recruited on merit, public power should not be used for private gain, there should be rule of law, and property rights should be secure. Many scholars argue the reason why, in spite of this knowledge, recent institutional reforms have had limited success is that improvements are not in the interest of incumbent elites. Constraining elites is, therefore, crucial for institutional improvements. In this article, I argue that economic diversification functions as one such constraint on elite behavior, affecting their ability to form collusive coalitions. When the economy is concentrated to a few sectors, elite interests are more uniform making it easier for them to organize. However, as the economy becomes more diverse, collusion becomes harder and elites must settle for impartial institutions more often. I test the theory using cross-national time series data covering the last 25 years; the results corroborate the theory, as the economy of a country becomes more diverse, institutions become more impartial.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

McLaughlin, Eoin. „An experiment in banking the poor: the Irish Mont-de-Piété, c. 1830–1850“. Financial History Review 20, Nr. 1 (27.11.2012): 49–72. http://dx.doi.org/10.1017/s0968565012000194.

Der volle Inhalt der Quelle
Annotation:
Continental pawnbroking institutions, Monts-de-Piété, were introduced in Ireland in the 1830s and 1840s but did not establish a permanent status. Irish social reformers believed that a Mont-de-Piété system would reduce the cost of borrowing for the poor and also fund a social welfare network, thus negating the need for an Irish Poor Law. This article explores the introduction of the Mont-de-Piété charitable pawnbroker in Ireland and outlines some reasons for its failure. It uses the market incumbents, private pawnbrokers, as a base group in a comparative study and asks why the Monts-de-Piété were the unsuccessful ones of the two. The article finds that the public nature and monopoly status of Monts-de-Piété on the Continent realised economies of scale and gave preferential interest rates on capital, as well as enabling the Mont-de-Piété loan book to be cross-subsidised. These conditions were not replicated in Ireland, hence the failure of the Monts-de-Piété there.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Incumbent User Privacy"

1

Makin, Cameron. „Primary User Obfuscation in an Incumbent Informed Spectrum Access System“. Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.

Der volle Inhalt der Quelle
Annotation:
With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility for PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation scheme can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Master of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ben-Mosbah, Azza. „Privacy-preserving spectrum sharing“. Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0008/document.

Der volle Inhalt der Quelle
Annotation:
Les bandes des fréquences, telles qu'elles sont aménagées aujourd'hui, sont statiquement allouées. Afin d'améliorer la productivité et l'efficacité de l'utilisation du spectre, une nouvelle approche a été proposée : le "partage dynamique du spectre". Les régulateurs, les industriels et les scientifiques ont examiné le partage des bandes fédérales entre les détenteurs de licences (utilisateurs primaires) et les nouveaux entrants (utilisateurs secondaires). La nature d'un tel partage peut faciliter les attaques d'inférence et mettre en péril les paramètres opérationnels des utilisateurs primaires. Par conséquent, le but de cette thèse est d'améliorer la confidentialité des utilisateurs primaires tout en permettant un accès secondaire au spectre. Premièrement, nous présentons une brève description des règles de partage et des exigences en termes de confidentialité dans les bandes fédérales. Nous étudions également les techniques de conservation de confidentialité (obscurcissement) proposées dans les domaines d'exploration et d'édition de données pour contrecarrer les attaques d'inférence. Ensuite, nous proposons et mettons en œuvre notre approche pour protéger la fréquence et la localisation opérationnelles contre les attaques d'inférence. La première partie étudie la protection de la fréquence opérationnelle en utilisant un obscurcissement inhérent et explicite pour préserver la confidentialité. La deuxième partie traite la protection de la localisation opérationnelle en utilisant la confiance comme principale contre-mesure pour identifier et atténuer un risque d'inférence. Enfin, nous présentons un cadre axé sur les risques qui résume notre travail et s'adapte à d'autres approches de protection de la confidentialité. Ce travail est soutenu par des modèles, des simulations et des résultats qui focalisent sur l'importance de quantifier les techniques de préservation de la confidentialité et d'analyser le compromis entre la protection de la confidentialité et l'efficacité du partage du spectre
Radio frequencies, as currently allocated, are statically managed. Spectrum sharing between commercial users and incumbent users in the Federal bands has been considered by regulators, industry, and academia as a great way to enhance productivity and effectiveness in spectrum use. However, allowing secondary users to share frequency bands with sensitive government incumbent users creates new privacy threats in the form of inference attacks. Therefore, the aim of this thesis is to enhance the privacy of the incumbent while allowing secondary access to the spectrum. First, we present a brief description of different sharing regulations and privacy requirements in Federal bands. We also survey the privacy-preserving techniques (i.e., obfuscation) proposed in data mining and publishing to thwart inference attacks. Next, we propose and implement our approach to protect the operational frequency and location of the incumbent operations from inferences. We follow with research on frequency protection using inherent and explicit obfuscation to preserve the incumbent's privacy. Then, we address location protection using trust as the main countermeasure to identify and mitigate an inference risk. Finally, we present a risk-based framework that integrates our work and accommodates other privacy-preserving approaches. This work is supported with models, simulations and results that showcase our work and quantify the importance of evaluating privacy-preserving techniques and analyzing the trade-off between privacy protection and spectrum efficiency
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Incumbent User Privacy"

1

Li, He, Yaling Yang, Yanzhi Dou, Chang Lu, Doug Zabransky und Jung-Min Park. „Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 55–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zabransky, Douglas, He Li, Chang Lu und Yaling Yang. „SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 78–88. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Flanagan, Anne. „Authorization and Licensing“. In Telecommunications Law and Regulation. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198807414.003.0009.

Der volle Inhalt der Quelle
Annotation:
Licensing is a key aspect of telecommunications regulation. At a basic level, a licence permits a telecommunications provider to offer specified equipment, networks, and/or services, and often conditions that permission on certain requirements. Licensing, however, can control market entry and, therefore, can be used to shape the market by limiting, or not, the number of players or the types of services. Licensing can create legal certainty for new entrants where the telecommunications regulatory or general legal framework is not comprehensive or otherwise adequate. Here, conditions and rights integrated into licences can substitute for such frameworks. Similarly, eg where private property rights might be uncertain, the licence can serve as a contract between governments and investors, a departure from the traditional legal nature of a licence. As a binding contract, it could guarantee exclusivity, ensure due process as well as impose performance obligations, eg market penetration or network roll-out requirements. Investors might otherwise be reluctant to commit the capital required to roll out new technologies and/or networks to improve and update services. Without performance obligations, countries might be unwilling to involve private parties in running the state-owned incumbent. Licensing can also foster competitive markets by imposing obligations on incumbents to level
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bianchi, Robert R. „Indonesia“. In China and the Islamic World, 63–79. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190915285.003.0006.

Der volle Inhalt der Quelle
Annotation:
With Indonesia, the Chinese are doubly vulnerable. Racial and religious prejudice against Indonesians of Chinese descent threatens both government and private business deals. At the same time, Jakarta is determined to project maritime power and to lead the creation of a broader Pacific community—ambitions that openly contradict China’s desire for preeminence in East Asia. Indonesian politicians can use the threat of Islamic militancy to great advantage, seeming to restrain it when Beijing is pliable and quietly encouraging it when China becomes overbearing. President Joko Widodo skillfully challenges China on maritime disputes while enlisting its economic support to fend off hard-line Muslims and nationalists. But in the capital city of Jakarta, the incumbent governor—a Chinese Indonesian—was ousted by an openly racist campaign that many mainstream Muslim leaders failed to denounce.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hunter, M. Gordon. „Information Systems and Small Business“. In Business Information Systems, 54–59. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-969-9.ch004.

Der volle Inhalt der Quelle
Annotation:
The subject area of the application of information systems to small business is a thoroughly interesting, yet relatively under-researched topic. Small business is an important part of any economy. In the United Kingdom, 25% of the gross domestic product is produced by small business, which employs 65% of the nation’s workers (Ballantine et al., 1998). In Canada, 43% of economic output is accounted for by small business, employing 50% of private sector employees (Industry Canada, 1997). Further, governments view the small business sector as that component of the economy that can best contribute to economic growth (Balderson, 2000). Given the importance of this sector of the economy, it is incumbent upon researchers and managers of small business to develop a better understanding of how information systems may contribute to the operation and growth of individual businesses as well as the overall sector. The objective of this article is to provide an overview of information systems used by small business. Research projects are presented that describe the current situation. Recommendations are then proffered for various stakeholders who should contribute to a more effective use of information systems by small business.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Panaïté, Oana. „Archives“. In Postcolonial Realms of Memory, 23–33. Liverpool University Press, 2020. http://dx.doi.org/10.3828/liverpool/9781789620665.003.0002.

Der volle Inhalt der Quelle
Annotation:
The archive is both an object and a practice where history and memory converge. Yet this French site of memory is also defined by what it leaves out, i.e. the colonial past. This article examines two sites – that is, two forms and practices of document conservation and management along with their public and didactic uses – that define the postcolonial context in France. The first is represented by former colonial archives (Musée national de l’histoire de l’immigration; Archives nationales d’outre-mer) whose relocation and renaming reflects public attitudes and state policies of obfuscation rather than disclosure of the colonial past. The second site is literature (novels by Condé, Monénembo, Chamoiseau and Sebbar), which operates as an intermediate space between memory and history and a realm of living memory that assumes the responsibility of remembering by fulfilling the three tasks incumbent upon the archival institution: managing public recollections, salvaging private memories, as well as conserving, selecting, organizing, and transmitting unrecorded or unacknowledged phenomena and events for social, political, and cultural purposes. The article also considers the lacunae in metropolitan literary history that constitutes, in the post-Lansonian French culture, a nation-building archival genre.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Incumbent User Privacy"

1

Li, He, Yanzhi Dou, Chang Lu, Doug Zabransky, Yaling Yang und Jung-Min Jerry Park. „Preserving the Incumbent Users’ Location Privacy in the 3.5 GHz Band“. In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2018. http://dx.doi.org/10.1109/dyspan.2018.8610470.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Dou, Yanzhi, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao und Kui Ren. „Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems“. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.322.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dou, Yanzhi, He Li, Kexiong Zeng, Jinshan Liu, Yaling Yang, Bo Gao und Kui Ren. „Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems“. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.40.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dou, Yanzhi, Kexiong (Curtis) Zeng, Yaling Yang und Kui Ren. „Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems“. In MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2973750.2985283.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Salama, Ahmed M., Ming Li, Loukas Lazos, Yong Xiao und Marwan Krunz. „Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users“. In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149191.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie