Journal articles on the topic 'Access list'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Access list.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pleszkun, A. R., and M. J. Thazhuthaveetil. "An architecture for efficient Lisp list access." ACM SIGARCH Computer Architecture News 14, no. 2 (May 1986): 191–98. http://dx.doi.org/10.1145/17356.17378.
Full textSetapa, Sharipah, and Tengku Puteri Suhilah. "An Access Control List for Role-Based System: An Observation and Recommendation." International Journal of Information and Education Technology 4, no. 6 (2014): 468–72. http://dx.doi.org/10.7763/ijiet.2014.v4.452.
Full textKim, No-Whan. "The case study to verify of a network based on router applying an ACL(: Access List)." Journal of the Korea institute of electronic communication sciences 11, no. 5 (May 31, 2016): 491–98. http://dx.doi.org/10.13067/jkiecs.2016.11.5.491.
Full textThazhuthaveetil, Matthew J., and Andrew R. Pleszkun. "On the structural locality of reference in LISP list access streams." Information Processing Letters 26, no. 2 (October 1987): 105–10. http://dx.doi.org/10.1016/0020-0190(87)90046-9.
Full textMcMullen, Anthony. "Resist the list." Bottom Line 27, no. 1 (May 6, 2014): 2–5. http://dx.doi.org/10.1108/bl-02-2014-0005.
Full textA.B., Chate, and Chirchi V.R. "Access Control List Provides Security in Network." International Journal of Computer Applications 121, no. 22 (July 18, 2015): 14–16. http://dx.doi.org/10.5120/21831-5090.
Full textShchukin, V. Yu. "List decoding for a multiple access hyperchannel." Problems of Information Transmission 52, no. 4 (October 2016): 329–43. http://dx.doi.org/10.1134/s0032946016040025.
Full textDuffin, Christian. "Internet access high on nurses’ wish list." Nursing Management 7, no. 2 (May 1, 2000): 5. http://dx.doi.org/10.7748/nm.7.2.5.s5.
Full textKiberd, B., J. Boudreault, V. Bhan, and R. Panek. "Access to the Kidney Transplant Wait List." American Journal of Transplantation 6, no. 11 (November 2006): 2714–20. http://dx.doi.org/10.1111/j.1600-6143.2006.01523.x.
Full textZENG, Kuang-Yi. "Towards the Optimization of Access Control List." Journal of Software 18, no. 4 (2007): 978. http://dx.doi.org/10.1360/jos180978.
Full textSong, Junshuai, Zhao Li, Chang Zhou, Jinze Bai, Zhenpeng Li, Jian Li, and Jun Gao. "Co-Displayed Items Aware List Recommendation." IEEE Access 8 (2020): 64591–602. http://dx.doi.org/10.1109/access.2020.2984543.
Full textMarmurek, Harvey H. C., and Peter J. Kwantes. "Reading Words and Wirds: Phonology and Lexical Access." Quarterly Journal of Experimental Psychology Section A 49, no. 3 (August 1996): 696–714. http://dx.doi.org/10.1080/713755634.
Full textMohammad, Aijaz. "Access controls on bmj.com: List of countries with free access seems incomplete." BMJ 330, no. 7496 (April 14, 2005): 904.3. http://dx.doi.org/10.1136/bmj.330.7496.904-b.
Full textCai, Ning. "List Decoding for Arbitrarily Varying Multiple Access Channel Revisited: List Configuration and Symmetrizability." IEEE Transactions on Information Theory 62, no. 11 (November 2016): 6095–110. http://dx.doi.org/10.1109/tit.2016.2608900.
Full textWatson, Roger. "Beall's list of predatory open access journals: RIP." Nursing Open 4, no. 2 (February 28, 2017): 60. http://dx.doi.org/10.1002/nop2.78.
Full textAl Abdulmohsin, Ibrahim M. "Techniques and algorithms for access control list optimization." Computers & Electrical Engineering 35, no. 4 (July 2009): 556–66. http://dx.doi.org/10.1016/j.compeleceng.2008.08.003.
Full textZeng, Weixin, Xiang Zhao, Jiuyang Tang, and Haichuan Shang. "Collective List-Only Entity Linking: A Graph-Based Approach." IEEE Access 6 (2018): 16035–45. http://dx.doi.org/10.1109/access.2018.2817652.
Full textXu, Bin, Chenhao Ying, and Yuan Luo. "An Improved $A^{\ast}$ Decoding Algorithm With List Decoding." IEEE Access 6 (2018): 46877–85. http://dx.doi.org/10.1109/access.2018.2866396.
Full textDoan, Nghia, Seyyed Ali Hashemi, and Warren J. Gross. "Fast Successive-Cancellation List Flip Decoding of Polar Codes." IEEE Access 10 (2022): 5568–84. http://dx.doi.org/10.1109/access.2021.3140151.
Full textFeng, Guo Fu, Ming Wang, Ming Chen, and Tao Chi. "Optimizing the Performance for Nonbonded Force Calculation of Chemical Simulation on CBEA." Applied Mechanics and Materials 80-81 (July 2011): 322–26. http://dx.doi.org/10.4028/www.scientific.net/amm.80-81.322.
Full textReid, A. B., A. J. Grant, and P. D. Alexander. "List Detection for the$K$-Symmetric Multiple-Access Channel." IEEE Transactions on Information Theory 51, no. 8 (August 2005): 2930–36. http://dx.doi.org/10.1109/tit.2005.851775.
Full textCanady, Valerie A. "More funding, access, employment top 2019 readers' wish list." Mental Health Weekly 29, no. 2 (January 13, 2019): 3–5. http://dx.doi.org/10.1002/mhw.31732.
Full textGalloway, S., A. Sharma, J. Ward, and A. R. Bodenham. "A review of an anaesthetic led vascular access list." Anaesthesia 60, no. 8 (August 2005): 772–78. http://dx.doi.org/10.1111/j.1365-2044.2005.04189.x.
Full textJing, Changle, Jun Xiong, Xin Wang, Jibo Wei, and Yantao Guo. "Low-Complexity Group Alternate Iterative List Detection for MIMO Systems." IEEE Access 4 (2016): 5858–67. http://dx.doi.org/10.1109/access.2016.2607222.
Full textLaksono, Agung Tri, and M. Alvian Habib Nasution. "Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (January 25, 2020): 83. http://dx.doi.org/10.30865/json.v1i2.1920.
Full textWu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.
Full textZhang, Xiaojun, Rongquan Sui, Jianming Cui, Dexue Zhang, and Qingtian Zeng. "Efficient Sorting Architecture for List-Fast-SSC Decoding of Polar Codes." IEEE Access 6 (2018): 61773–81. http://dx.doi.org/10.1109/access.2018.2875756.
Full textKim, Jae-Won, Jun-Woo Tak, Hee-youl Kwak, and Jong-Seon No. "A New List Decoding Algorithm for Short-Length TBCCs With CRC." IEEE Access 6 (2018): 35105–11. http://dx.doi.org/10.1109/access.2018.2847348.
Full textLee, Kyungpil, and In-Cheol Park. "Large-Small Sorting for Successive Cancellation List Decoding of Polar Codes." IEEE Access 8 (2020): 96955–62. http://dx.doi.org/10.1109/access.2020.2996016.
Full textWang, Chao, Jian Yang, Huasen He, Ruida Zhou, Shuangwu Chen, and Xiaofeng Jiang. "Neighbor Cell List Optimization in Handover Management Using Cascading Bandits Algorithm." IEEE Access 8 (2020): 134137–50. http://dx.doi.org/10.1109/access.2020.3011015.
Full textCheng, Fengyi, Aijun Liu, Yingxian Zhang, and Jing Ren. "Bit-Flip Algorithm for Successive Cancellation List Decoder of Polar Codes." IEEE Access 7 (2019): 58346–52. http://dx.doi.org/10.1109/access.2019.2914691.
Full textNguyen, Thanh-Ngo, Loan T. T. Nguyen, Bay Vo, Ngoc-Thanh Nguyen, and Trinh D. D. Nguyen. "An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns." IEEE Access 8 (2020): 116840–55. http://dx.doi.org/10.1109/access.2020.3004530.
Full textSaha, Suman, Junbin Gao, and Richard Gerlach. "Stock Ranking Prediction Using List-Wise Approach and Node Embedding Technique." IEEE Access 9 (2021): 88981–96. http://dx.doi.org/10.1109/access.2021.3090834.
Full textP, Vidhya, and A. P. V. Raghavendra. "Protecting Global Records Sharing with Identity Based Access Control List." International Journal of Computer Applications Technology and Research 3, no. 11 (November 1, 2014): 661–63. http://dx.doi.org/10.7753/ijcatr0311.1001.
Full textWalsh, Gretchen. "African Newspaper Union List: low‐tech resource/high‐tech access." Library Hi Tech 18, no. 3 (September 2000): 215–23. http://dx.doi.org/10.1108/07378830010348116.
Full textGingerich, Barbara Stover. "Sanctions List Findings: How to Access, What Actions to Take." Home Health Care Management & Practice 14, no. 5 (August 2002): 389–90. http://dx.doi.org/10.1177/1084822302014005012.
Full textFirmansyah, Firmansyah, and Mochamad Wahyudi. "Analisis Performa Access Control List Menggunakan Metode Firewall Policy Base." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 31, 2021): 283–92. http://dx.doi.org/10.30812/matrik.v20i2.1068.
Full textFitriansyah, Ahmad, Alarik Andreansyah, and Abu Sopian. "Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan." Jurnal Teknologi Informatika dan Komputer 5, no. 2 (October 1, 2019): 58–63. http://dx.doi.org/10.37012/jtik.v5i2.176.
Full textAbdulla, Aziz. "Friends of Open Access." TJES Vol.27 No.3 (2020) 27, no. 3 (September 1, 2020): 1–7. http://dx.doi.org/10.25130/tjes.27.3.pb1.
Full textZhang, Huazi, Jiajie Tong, Rong Li, Pengcheng Qiu, Yourui Huangfu, Chen Xu, Xianbin Wang, and Jun Wang. "A Flip-Syndrome-List Polar Decoder Architecture for Ultra-Low-Latency Communications." IEEE Access 7 (2019): 1149–59. http://dx.doi.org/10.1109/access.2018.2886464.
Full textZhong, Hong, Bo Huang, Jie Cui, Yan Xu, and Lu Liu. "Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks." IEEE Access 6 (2018): 2241–50. http://dx.doi.org/10.1109/access.2017.2782672.
Full textWang, Lijin, Rongying Cai, Min Lin, and Yiwen Zhong. "Enhanced List-Based Simulated Annealing Algorithm for Large-Scale Traveling Salesman Problem." IEEE Access 7 (2019): 144366–80. http://dx.doi.org/10.1109/access.2019.2945570.
Full textWei, Chunting, Jiwei Qin, and Wei Zeng. "DNR: A Unified Framework of List Ranking With Neural Networks for Recommendation." IEEE Access 9 (2021): 158313–21. http://dx.doi.org/10.1109/access.2021.3130369.
Full textJacek, Anna, Klaudia Kędzior, and Sławomir Porada. "The waiting list as an instrument, rationalizing access to health care benefits." Zdrowie Publiczne 123, no. 2 (May 1, 2013): 112–15. http://dx.doi.org/10.12923/j.0044-2011/123-2/a.02.
Full textChen, Tianpei, and Harry Leib. "Selection Based List Detection With Approximate Matrix Inversion for Large-Scale MIMO Systems." IEEE Access 6 (2018): 71751–66. http://dx.doi.org/10.1109/access.2018.2881412.
Full textNam, Hyoju, Unil Yun, Bay Vo, Tin Truong, Zhi-Hong Deng, and Eunchul Yoon. "Efficient Approach for Damped Window-Based High Utility Pattern Mining With List Structure." IEEE Access 8 (2020): 50958–68. http://dx.doi.org/10.1109/access.2020.2979289.
Full textAlkhalili, Mohannad, Mahmoud H. Qutqut, and Fadi Almasalha. "Investigation of Applying Machine Learning for Watch-List Filtering in Anti-Money Laundering." IEEE Access 9 (2021): 18481–96. http://dx.doi.org/10.1109/access.2021.3052313.
Full textBeal, Eliza W., Dmitry Tumin, Lindsay Sobotka, Joseph D. Tobias, Don Hayes, Timothy M. Pawlik, Kenneth Washburn, Khalid Mumtaz, Lanla Conteh, and Sylvester M. Black. "Patients From Appalachia Have Reduced Access to Liver Transplantation After Wait-Listing." Progress in Transplantation 28, no. 4 (September 11, 2018): 305–13. http://dx.doi.org/10.1177/1526924818800037.
Full textHearnshaw, J. B. "Access to Telescopes in Developing Countries." Highlights of Astronomy 11, no. 2 (1998): 920–22. http://dx.doi.org/10.1017/s153929960001916x.
Full textMerivaki, Thessalia. "“Our Voter Rolls Are Cleaner Than Yours”: Balancing Access and Integrity in Voter List Maintenance." American Politics Research 48, no. 5 (February 17, 2020): 560–70. http://dx.doi.org/10.1177/1532673x20906472.
Full text