Journal articles on the topic 'Access list'

To see the other types of publications on this topic, follow the link: Access list.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Access list.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pleszkun, A. R., and M. J. Thazhuthaveetil. "An architecture for efficient Lisp list access." ACM SIGARCH Computer Architecture News 14, no. 2 (May 1986): 191–98. http://dx.doi.org/10.1145/17356.17378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Setapa, Sharipah, and Tengku Puteri Suhilah. "An Access Control List for Role-Based System: An Observation and Recommendation." International Journal of Information and Education Technology 4, no. 6 (2014): 468–72. http://dx.doi.org/10.7763/ijiet.2014.v4.452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, No-Whan. "The case study to verify of a network based on router applying an ACL(: Access List)." Journal of the Korea institute of electronic communication sciences 11, no. 5 (May 31, 2016): 491–98. http://dx.doi.org/10.13067/jkiecs.2016.11.5.491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thazhuthaveetil, Matthew J., and Andrew R. Pleszkun. "On the structural locality of reference in LISP list access streams." Information Processing Letters 26, no. 2 (October 1987): 105–10. http://dx.doi.org/10.1016/0020-0190(87)90046-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McMullen, Anthony. "Resist the list." Bottom Line 27, no. 1 (May 6, 2014): 2–5. http://dx.doi.org/10.1108/bl-02-2014-0005.

Full text
Abstract:
Purpose – The purpose of this study is to provide insights into issues encountered in maintaining library technologies and electronic collections in changing times and on a limited budget with limited personnel. Design/methodology/approach – The study uses real world observations and experiences, data collected from an informal survey, insights gleaned from the professional literature and anecdotal evidence to provide commentary on the questionable methods many libraries employ in providing access to electronic resources. Findings – Libraries spend large sums of money and significant percentages of overall budgets on electronic resources, yet many fail to take the extra step to provide access to the content in these disparate resources via a web scale discovery search service. What is worse is that a large number of libraries still employ the flawed “Databases A-Z” list as a primary means of providing access. Originality/value – This paper is a light-hearted piece on one librarian’s observations regarding the inherent flaws in the traditional “Databases A-Z” list. It includes data from an informal survey.
APA, Harvard, Vancouver, ISO, and other styles
6

A.B., Chate, and Chirchi V.R. "Access Control List Provides Security in Network." International Journal of Computer Applications 121, no. 22 (July 18, 2015): 14–16. http://dx.doi.org/10.5120/21831-5090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shchukin, V. Yu. "List decoding for a multiple access hyperchannel." Problems of Information Transmission 52, no. 4 (October 2016): 329–43. http://dx.doi.org/10.1134/s0032946016040025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Duffin, Christian. "Internet access high on nurses’ wish list." Nursing Management 7, no. 2 (May 1, 2000): 5. http://dx.doi.org/10.7748/nm.7.2.5.s5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kiberd, B., J. Boudreault, V. Bhan, and R. Panek. "Access to the Kidney Transplant Wait List." American Journal of Transplantation 6, no. 11 (November 2006): 2714–20. http://dx.doi.org/10.1111/j.1600-6143.2006.01523.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

ZENG, Kuang-Yi. "Towards the Optimization of Access Control List." Journal of Software 18, no. 4 (2007): 978. http://dx.doi.org/10.1360/jos180978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Song, Junshuai, Zhao Li, Chang Zhou, Jinze Bai, Zhenpeng Li, Jian Li, and Jun Gao. "Co-Displayed Items Aware List Recommendation." IEEE Access 8 (2020): 64591–602. http://dx.doi.org/10.1109/access.2020.2984543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Marmurek, Harvey H. C., and Peter J. Kwantes. "Reading Words and Wirds: Phonology and Lexical Access." Quarterly Journal of Experimental Psychology Section A 49, no. 3 (August 1996): 696–714. http://dx.doi.org/10.1080/713755634.

Full text
Abstract:
Naming latency for printed words is inversely related to their frequency. Four experiments were run to test whether the naming of non-words that are homophones of words (pseudohomophones) is similarly influenced by the frequency of those words. McCann and Besner (1987) failed to find such a frequency effect for pseudohomophones when they were presented in a list of non-words. The present studies show that list structure is critical: A frequency effect occurs for pseudohomophones in a list only of homophones and in a list containing words. The list structure effect was found for three different stimulus lists and suggests that lexical access is strategic. If none of the items in a list has a lexical entry, then pronunciation may be the product of a non-lexical process. If all items have a lexical entry that may be accessed orthographically or phonologically, then pronunciation will be the product of a lexical process.
APA, Harvard, Vancouver, ISO, and other styles
13

Mohammad, Aijaz. "Access controls on bmj.com: List of countries with free access seems incomplete." BMJ 330, no. 7496 (April 14, 2005): 904.3. http://dx.doi.org/10.1136/bmj.330.7496.904-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cai, Ning. "List Decoding for Arbitrarily Varying Multiple Access Channel Revisited: List Configuration and Symmetrizability." IEEE Transactions on Information Theory 62, no. 11 (November 2016): 6095–110. http://dx.doi.org/10.1109/tit.2016.2608900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Watson, Roger. "Beall's list of predatory open access journals: RIP." Nursing Open 4, no. 2 (February 28, 2017): 60. http://dx.doi.org/10.1002/nop2.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Al Abdulmohsin, Ibrahim M. "Techniques and algorithms for access control list optimization." Computers & Electrical Engineering 35, no. 4 (July 2009): 556–66. http://dx.doi.org/10.1016/j.compeleceng.2008.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zeng, Weixin, Xiang Zhao, Jiuyang Tang, and Haichuan Shang. "Collective List-Only Entity Linking: A Graph-Based Approach." IEEE Access 6 (2018): 16035–45. http://dx.doi.org/10.1109/access.2018.2817652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Bin, Chenhao Ying, and Yuan Luo. "An Improved $A^{\ast}$ Decoding Algorithm With List Decoding." IEEE Access 6 (2018): 46877–85. http://dx.doi.org/10.1109/access.2018.2866396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Doan, Nghia, Seyyed Ali Hashemi, and Warren J. Gross. "Fast Successive-Cancellation List Flip Decoding of Polar Codes." IEEE Access 10 (2022): 5568–84. http://dx.doi.org/10.1109/access.2021.3140151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Feng, Guo Fu, Ming Wang, Ming Chen, and Tao Chi. "Optimizing the Performance for Nonbonded Force Calculation of Chemical Simulation on CBEA." Applied Mechanics and Materials 80-81 (July 2011): 322–26. http://dx.doi.org/10.4028/www.scientific.net/amm.80-81.322.

Full text
Abstract:
The molecular dynamics tool usually employs a neighbor list that contains the particle pairs for which non-bonded forces would be calculated. Though accessing to the array of atoms’ position and force does not exhibit a cache friendly pattern on a computer during the nonbonded force calculation, the neighbor list could be referred as a directive for the memory access. Designing specific data prefetching policy according to the neighbour list which was generated before the calculation can reduce the latency of memory access and improve the molecular dynamics simulation process. In this paper, an optimization memory access method referred by particle neighbor list based on CBEA was proposed. The experimental result shows that the proposed method reduces the latency of memory access and improves performance of the molecular-dynamics-based chemical simulation greatly.
APA, Harvard, Vancouver, ISO, and other styles
21

Reid, A. B., A. J. Grant, and P. D. Alexander. "List Detection for the$K$-Symmetric Multiple-Access Channel." IEEE Transactions on Information Theory 51, no. 8 (August 2005): 2930–36. http://dx.doi.org/10.1109/tit.2005.851775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Canady, Valerie A. "More funding, access, employment top 2019 readers' wish list." Mental Health Weekly 29, no. 2 (January 13, 2019): 3–5. http://dx.doi.org/10.1002/mhw.31732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Galloway, S., A. Sharma, J. Ward, and A. R. Bodenham. "A review of an anaesthetic led vascular access list." Anaesthesia 60, no. 8 (August 2005): 772–78. http://dx.doi.org/10.1111/j.1365-2044.2005.04189.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jing, Changle, Jun Xiong, Xin Wang, Jibo Wei, and Yantao Guo. "Low-Complexity Group Alternate Iterative List Detection for MIMO Systems." IEEE Access 4 (2016): 5858–67. http://dx.doi.org/10.1109/access.2016.2607222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Laksono, Agung Tri, and M. Alvian Habib Nasution. "Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (January 25, 2020): 83. http://dx.doi.org/10.30865/json.v1i2.1920.

Full text
Abstract:
In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.
APA, Harvard, Vancouver, ISO, and other styles
26

Wu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.

Full text
Abstract:
Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Xiaojun, Rongquan Sui, Jianming Cui, Dexue Zhang, and Qingtian Zeng. "Efficient Sorting Architecture for List-Fast-SSC Decoding of Polar Codes." IEEE Access 6 (2018): 61773–81. http://dx.doi.org/10.1109/access.2018.2875756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kim, Jae-Won, Jun-Woo Tak, Hee-youl Kwak, and Jong-Seon No. "A New List Decoding Algorithm for Short-Length TBCCs With CRC." IEEE Access 6 (2018): 35105–11. http://dx.doi.org/10.1109/access.2018.2847348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Kyungpil, and In-Cheol Park. "Large-Small Sorting for Successive Cancellation List Decoding of Polar Codes." IEEE Access 8 (2020): 96955–62. http://dx.doi.org/10.1109/access.2020.2996016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Chao, Jian Yang, Huasen He, Ruida Zhou, Shuangwu Chen, and Xiaofeng Jiang. "Neighbor Cell List Optimization in Handover Management Using Cascading Bandits Algorithm." IEEE Access 8 (2020): 134137–50. http://dx.doi.org/10.1109/access.2020.3011015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cheng, Fengyi, Aijun Liu, Yingxian Zhang, and Jing Ren. "Bit-Flip Algorithm for Successive Cancellation List Decoder of Polar Codes." IEEE Access 7 (2019): 58346–52. http://dx.doi.org/10.1109/access.2019.2914691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nguyen, Thanh-Ngo, Loan T. T. Nguyen, Bay Vo, Ngoc-Thanh Nguyen, and Trinh D. D. Nguyen. "An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns." IEEE Access 8 (2020): 116840–55. http://dx.doi.org/10.1109/access.2020.3004530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Saha, Suman, Junbin Gao, and Richard Gerlach. "Stock Ranking Prediction Using List-Wise Approach and Node Embedding Technique." IEEE Access 9 (2021): 88981–96. http://dx.doi.org/10.1109/access.2021.3090834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

P, Vidhya, and A. P. V. Raghavendra. "Protecting Global Records Sharing with Identity Based Access Control List." International Journal of Computer Applications Technology and Research 3, no. 11 (November 1, 2014): 661–63. http://dx.doi.org/10.7753/ijcatr0311.1001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Walsh, Gretchen. "African Newspaper Union List: low‐tech resource/high‐tech access." Library Hi Tech 18, no. 3 (September 2000): 215–23. http://dx.doi.org/10.1108/07378830010348116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gingerich, Barbara Stover. "Sanctions List Findings: How to Access, What Actions to Take." Home Health Care Management & Practice 14, no. 5 (August 2002): 389–90. http://dx.doi.org/10.1177/1084822302014005012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Firmansyah, Firmansyah, and Mochamad Wahyudi. "Analisis Performa Access Control List Menggunakan Metode Firewall Policy Base." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 31, 2021): 283–92. http://dx.doi.org/10.30812/matrik.v20i2.1068.

Full text
Abstract:
Pemanfaatan teknologi informasi mampu mendukung mobilitas yang begitu cepat dan sangat efesien. Kini, hampir semua transfer data dilakukan menggunakan jaringan komputer dan bersifat terbuka. dengan terjadinya transfer data yang bersifat terbuka hal ini mampu memicu terjadinya kejahatan didalam dunia jaringan komputer (cybercrime). Penerapan keamanan jaringan komputer merupakan hal yang sangat vital. untuk memiminalisir cybercrime didalam jaringan komputer, maka diterapkanlah keamanan jaringan menggunakan metode zone-based policy firewall. Zone-based policy firewall mampu melakukan pembatasan akses berdasarkan mekanisme keamanan yang digunakan untuk melindungi sistem internal dari gangguan para pelaku Cybercrime atau pihak-pihak lain yang ingin memasuki kedalam sistem tanpa mempunyai hak akses. dari hasil penelitian analisa performa access control list menggunakan metode zon based policy firewall didapatkan penerapan keamanan jaringan komputer zone-based policy firewall mampu membatasi akses menuju server dari client yang terhubung didalam jaringan yang sama. Serta zone-based policy firewall mampu menyembunyikan hop count yang dilalui untuk menghubungkan antara client dengan server.
APA, Harvard, Vancouver, ISO, and other styles
38

Fitriansyah, Ahmad, Alarik Andreansyah, and Abu Sopian. "Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan." Jurnal Teknologi Informatika dan Komputer 5, no. 2 (October 1, 2019): 58–63. http://dx.doi.org/10.37012/jtik.v5i2.176.

Full text
Abstract:
Di jaringan, satu komputer dapat berbagi dan bertukar data dengan komputer lain dalam bentuk gambar, teks, atau suara dengan melewati media yang menghubungkan komputer. Jaringan Komputer yang memiliki banyak kelebihan yang dapat memudahkan pekerjaan juga memiliki kelemahan bagi organisasi. Salah satu ancaman yang mungkin terjadi adalah pencurian data. Salah satu cara untuk melindungi terhadap transfer data dalam jaringan komputer adalah dengan menggunakan VLAN Statis dan Daftar Akses. Tujuan dari penelitian ini adalah untuk menganalisis kondisi saat ini dan menerapkan konsep VLAN Statis dan Daftar Akses sehingga perusahaan dapat memberikan hak akses data dari setiap pengguna komputer di setiap divisi, sehingga meminimalkan penggunaan perlindungan data oleh pihak yang tidak berwenang.Metode yang digunakan dalam penelitian ini adalah metode simulasi yang menggunakan perangkat lunak Cisco Packet Tracer dan perangkat router Sangfor firewall. Metode pengumpulan data dalam penelitian ini adalah observasi dan wawancara dengan direktur perusahaan.Hasil penelitian menunjukkan bahwa distribusi jaringan menggunakan VLAN statis dan keamanan data menggunakan Daftar Akses dapat diimplementasikan dengan baik di perusahaan dan membuat jaringan yang dibuat dapat membuat perusahaan melakukan pekerjaan lebih mudah dan data transaksi untuk setiap divisi dapat dilakukan dengan aman.
APA, Harvard, Vancouver, ISO, and other styles
39

Abdulla, Aziz. "Friends of Open Access." TJES Vol.27 No.3 (2020) 27, no. 3 (September 1, 2020): 1–7. http://dx.doi.org/10.25130/tjes.27.3.pb1.

Full text
Abstract:
Abstract Peace, mercy, and blessings of God be upon you https://scholarlyoa.net I looked at the site above, and on the allegations, he makes against Beall Jeffrey I would like to clarify the following 1-It seems that the site is not official, and those who are responsible for it are unknown and they call themselves Friends of Open Access or a group of librarians did not say, publishers or university professors, they did not mention any name or institution sponsoring the site. 2-I read most of their claims about Beall Jaffrey’s criteria, and it is incorrect. The criteria of Beall Jeffrey consist of about 40 items, and all of them are logical. And through it, the predatory journal is published quickly, without evaluation, and without classifying the article in international databases. 3-It focuses on the standard of publishing fees only, which is one of the criteria and does not mean that every journal that asks for fees is a predatory journal. 4-The site uses the same name as the Beall list but has a .net extension instead of .com, It violates publishing ethics and exploits the reputation of the well-known and well-known website. 5-Below are the links to Beall Jeffrey scientific pages, which shows the credibility of his articles published in reputable international journals. He has more than 1000 citations in the Scopus database and more than 3000 total citations in all journals –https://scholar.google.com.my/citations?hl=ar&user=EtHsEcMAAAAJ –https://www.scopus.com/authid/detail.uri?authorId=8869689200 6-Beall’s main website was suspended in 2017, there are many websites now that rely on Beall Jeffrey’s criteria, but most of them are unofficial, and it may demand sums from journals to be removed from the list. 7-This site claims the existence of lawsuits against Bell Jefri and does not provide any evidence for that.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Huazi, Jiajie Tong, Rong Li, Pengcheng Qiu, Yourui Huangfu, Chen Xu, Xianbin Wang, and Jun Wang. "A Flip-Syndrome-List Polar Decoder Architecture for Ultra-Low-Latency Communications." IEEE Access 7 (2019): 1149–59. http://dx.doi.org/10.1109/access.2018.2886464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Zhong, Hong, Bo Huang, Jie Cui, Yan Xu, and Lu Liu. "Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks." IEEE Access 6 (2018): 2241–50. http://dx.doi.org/10.1109/access.2017.2782672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Lijin, Rongying Cai, Min Lin, and Yiwen Zhong. "Enhanced List-Based Simulated Annealing Algorithm for Large-Scale Traveling Salesman Problem." IEEE Access 7 (2019): 144366–80. http://dx.doi.org/10.1109/access.2019.2945570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wei, Chunting, Jiwei Qin, and Wei Zeng. "DNR: A Unified Framework of List Ranking With Neural Networks for Recommendation." IEEE Access 9 (2021): 158313–21. http://dx.doi.org/10.1109/access.2021.3130369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jacek, Anna, Klaudia Kędzior, and Sławomir Porada. "The waiting list as an instrument, rationalizing access to health care benefits." Zdrowie Publiczne 123, no. 2 (May 1, 2013): 112–15. http://dx.doi.org/10.12923/j.0044-2011/123-2/a.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Tianpei, and Harry Leib. "Selection Based List Detection With Approximate Matrix Inversion for Large-Scale MIMO Systems." IEEE Access 6 (2018): 71751–66. http://dx.doi.org/10.1109/access.2018.2881412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Nam, Hyoju, Unil Yun, Bay Vo, Tin Truong, Zhi-Hong Deng, and Eunchul Yoon. "Efficient Approach for Damped Window-Based High Utility Pattern Mining With List Structure." IEEE Access 8 (2020): 50958–68. http://dx.doi.org/10.1109/access.2020.2979289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Alkhalili, Mohannad, Mahmoud H. Qutqut, and Fadi Almasalha. "Investigation of Applying Machine Learning for Watch-List Filtering in Anti-Money Laundering." IEEE Access 9 (2021): 18481–96. http://dx.doi.org/10.1109/access.2021.3052313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Beal, Eliza W., Dmitry Tumin, Lindsay Sobotka, Joseph D. Tobias, Don Hayes, Timothy M. Pawlik, Kenneth Washburn, Khalid Mumtaz, Lanla Conteh, and Sylvester M. Black. "Patients From Appalachia Have Reduced Access to Liver Transplantation After Wait-Listing." Progress in Transplantation 28, no. 4 (September 11, 2018): 305–13. http://dx.doi.org/10.1177/1526924818800037.

Full text
Abstract:
Background: The Appalachian region is medically underserved and characterized by high morbidity and mortality. We investigated disparities among patients listed for liver transplantation (LT) in wait-list outcomes, according to residence in the Appalachian region. Methods: Data on adult patients listed for LT were obtained from the United Network for Organ Sharing for July 2013 to December 2015. Wait-list outcomes were compared using cause-specific hazard models by region of residence (Appalachian vs non-Appalachian) among patients listed at centers serving Appalachia. Posttransplant patient and graft survival were also compared. The study included 1835 LT candidates from Appalachia and 5200 from non-Appalachian regions, of whom 1016 patients experienced wait-list mortality or were delisted; 3505 received liver transplants. Results: In multivariable analyses, patients from Appalachia were less likely to receive LT (hazard ratio [HR] = 0.86; 95% confidence interval [CI]: 0.79-0.93; P < .001), but Appalachian residence was not associated with wait-list mortality or delisting (HR = 1.03; 95% CI: 0.89-1.18; P = .696). Among liver transplant recipients, patient and graft survival did not differ by Appalachian versus non-Appalachian residence. Conclusion: Appalachian residence was associated with lower access to transplantation after listing for LT. This geographic disparity should be addressed in the current debate over reforming donor liver allocation and patient priority for LT.
APA, Harvard, Vancouver, ISO, and other styles
49

Hearnshaw, J. B. "Access to Telescopes in Developing Countries." Highlights of Astronomy 11, no. 2 (1998): 920–22. http://dx.doi.org/10.1017/s153929960001916x.

Full text
Abstract:
The ambiguity in this paper’s title is deliberate. Are we talking about astronomers or telescopes in developing countries? And are the countries concerned developing economically or astronomically? In practice I will cover both options in each case.The list below summarizes six possible routes for the acquisition of astronomical observational data that may be available to astronomers in countries developing economically, astronomically or in both ways. Not all these options will be available in any one case; indeed most of them will probably not be available. However, examples of all of them can readily be found.
APA, Harvard, Vancouver, ISO, and other styles
50

Merivaki, Thessalia. "“Our Voter Rolls Are Cleaner Than Yours”: Balancing Access and Integrity in Voter List Maintenance." American Politics Research 48, no. 5 (February 17, 2020): 560–70. http://dx.doi.org/10.1177/1532673x20906472.

Full text
Abstract:
Accurate voter lists facilitate access to the electoral process, indicate efficient voter list maintenance, and reinforce electoral integrity. Errors in voter records often result from variation in practices that are difficult to avoid given the decentralized structure of election administration in the United States. In many states, localities lack capacity to efficiently complete voter list maintenance, especially when pressured to keep “clean” voter rolls. I argue that local challenges remain when maintaining voters’ registration and voting history information, which undermines the quality of voter lists and the integrity of the electoral process. I analyze Mississippi’s Statewide Election Management System (SEMS) records and find that voter registration and voting history errors are linked to the county’s active and inactive registered voter rates and demographic characteristics. These findings confirm that local variation in voter list maintenance can impact voters depending on their voter registration status and can result in premature voter list removal.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography