Academic literature on the topic 'Access sharing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Access sharing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Access sharing"

1

Simpson, Donald B. "Resource Sharing = Access + Ownership:." Journal of Library Administration 20, no. 1 (March 27, 1995): 95–107. http://dx.doi.org/10.1300/j111v20n01_08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cornaglia, Bruno, Gavin Young, and Antonio Marchetta. "Fixed Access Network Sharing." Optical Fiber Technology 26 (December 2015): 2–11. http://dx.doi.org/10.1016/j.yofte.2015.07.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karr, Alan F. "Data Sharing and Access." Annual Review of Statistics and Its Application 3, no. 1 (June 2016): 113–32. http://dx.doi.org/10.1146/annurev-statistics-041715-033438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kerpez, Kenneth J., John M. Cioffi, Peter J. Silverman, Bruno Cornaglia, and Gavin Young. "Fixed Access Network Sharing." IEEE Communications Standards Magazine 1, no. 1 (March 2017): 82–89. http://dx.doi.org/10.1109/mcomstd.2017.1600001st.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lyu, Yan, Victor C. S. Lee, Chi-Yin Chow, Joseph Kee-Yin Ng, Yanhua Li, and Jia Zeng. "R-Sharing: Rendezvous for Personalized Taxi Sharing." IEEE Access 6 (2018): 5023–36. http://dx.doi.org/10.1109/access.2017.2778221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mouw, James. "Access, ownership and resource sharing." Serials Review 22, no. 2 (June 1996): 95–96. http://dx.doi.org/10.1080/00987913.1996.10764314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wicks, P. "Sharing access might increase engagement." BMJ 341, dec20 2 (December 20, 2010): c7209. http://dx.doi.org/10.1136/bmj.c7209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Owens, Brian. "Data sharing: Access all areas." Nature 533, no. 7602 (May 2016): S71—S72. http://dx.doi.org/10.1038/533s71a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stępnicka, Nina, and Paulina Wiączek. "ACCESS ECONOMY AND SHARING ECONOMY IN THE LIGHT OF THE INNOVATION THEORY." PRACE NAUKOWE UNIWERSYTETU EKONOMICZNEGO WE WROCŁAWIU, no. 509 (2018): 396–405. http://dx.doi.org/10.15611/pn.2018.509.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Posner, Beth, Jennifer DeVito, Katharine Haldeman, and Dennis Massie. "Reciprocal On-Site Access: Sharing Information by Sharing Library Spaces." Journal of Library Administration 60, no. 1 (January 2, 2020): 80–87. http://dx.doi.org/10.1080/01930826.2019.1685270.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Access sharing"

1

Beiter, Bernd Michael. "Secret sharing schemes on general access structures /." Aachen : Shaker, 2008. http://d-nb.info/991819993/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sleeper, Manya. "Everyday Online Sharing." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/881.

Full text
Abstract:
People make a range of everyday decisions about how and whether to share content with different people, across different platforms and services, during a variety of tasks. These sharing decisions can encompass complex preferences and a variety of access-control dimensions. In this thesis I examine potential methods for improving sharing mechanisms by better understanding the everyday online sharing environment and evaluating a potential sharing tool. I first present two studies that explore how current sharing mechanisms may fall short on social networking sites, leading to suboptimal outcomes such as regret or self censorship. I discuss the implications of these suboptimal outcomes for the design of behavioral nudging tools and the potential for improving the design of selective-sharing mechanisms. I then draw on a third study to explore the broader “ecosystem” of available channels created by the services and platforms people move between and combine to share content in everyday contexts. I examine the role of selective-sharing features in the broader audience-driven and task-driven dynamics that drive sharing decisions in this environment. I discuss the implications of channel choice and dynamics for the design of selective-sharing mechanisms. Using insights from current shortfalls and ecosystem-level dynamics I then present a fourth study examining the potential for adding topic-driven sharing mechanisms to Facebook. I use design mockups and a lab-based interview to explore participants’ hypothetical use cases for such mechanisms. I find that these mechanisms could potentially be useful in a variety of situations, but successful implementation would require accounting for privacy requirements and users’ sharing strategies.
APA, Harvard, Vancouver, ISO, and other styles
3

Kaskaloglu, Kerem. "Some Generalized Multipartite Access Structures." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611965/index.pdf.

Full text
Abstract:
In this work, we study some generalized multipartite access structures and linear secret sharing schemes for their realizations. Given a multipartite set of participants with m compartments (or levels) and m conditions to be satisfied by an authorized set, we firstly examine the intermediary access structures arousing from the natural case concerning that any c out of m of these conditions suffice, instead of requiring anyone or all of the m conditions simultaneously, yielding to generalizations for both the compartmented and hierarchical cases. These are realized essentially by employing a series of Lagrange interpolations and a simple frequently-used connective tool called access structure product, as well as some known constructions for existing ideal schemes. The resulting schemes are non-ideal but perfect. We also consider nested multipartite access structures, where we let a compartment to be defined within another, so that the access structure is composed of some multipartite substructures. We extend formerly employed bivariate interpolation techniques to multivariate interpolation, in order to realize such access structures. The generic scheme we consider is perfect with a high probability such as 1-O(1/q) on a finite field F_q. In particular, we propose a non-nested generalization for the conventional compartmented access structures, which depicts a stronger way of controlling the additional participants.
APA, Harvard, Vancouver, ISO, and other styles
4

Kayem, Anne Voluntas dei Massah. "Adaptive Cryptographic Access Control for Dynamic Data Sharing Environments." Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

He, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.

Full text
Abstract:
Au cours de ces dernières années, de plus en plus d’utilisateurs choisissent de diffuser leurs photos sur des plateformes de partage d’images. Ces plateformes permettent aux utilisateurs de restreindre l’accès aux images à un groupe de personnes, afin de donner un sentiment de confiance aux utilisateurs vis-à-vis de la confidentialité de ces images. Malheureusement, la confidentialité ne peut être garantie sachant que le fournisseur de la plateforme a accès aux contenus de n’importe quelle image publiée sur sa plateforme. En revanche, si les images sont mises en ligne chiffrées, seules les personnes ayant la possibilité de déchiffrer les images, auront accès aux images. Ainsi, la confidentialité peut être assurée. Trois principales spécificités sont à prendre en compte lors du chiffrement d’une image : le schéma de chiffrement doit être effectué en respectant le format de l’image (e.g. format JPEG), garantir l’indistinguabilité (l’adversaire ne doit obtenir de l’information sur le contenu de l’image à partir de l’image chiffrée), et doit être compatible avec les traitements des images spécifiques à la plateforme de partage d’images. L’objectif principal de cette thèse a été de proposer un tel schéma de chiffrement pour les images JPEG. Nous avons d’abord proposé et implémenté un schéma de chiffrement garantissant la conservation de l’image et l’indistinguabilité. Malheureusement, nous avons montré que sur Facebook, Instagram, Weibo et Wechat, notre solution ne permettait de maintenir une qualité d’images suffisante après déchiffrement. Par conséquent, des codes correcteurs ont été ajoutés à notre schéma de chiffrement, afin de maintenir la qualité des images
In recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
APA, Harvard, Vancouver, ISO, and other styles
6

Brahma, Swastik Kumar. "Spectrum sharing and service pricing in dynamic spectrum access networks." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4854.

Full text
Abstract:
Traditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the spectrum to higher valued uses, thereby resulting in inefficient spectrum utilization (23, 38, 42, 62, 67). These limitations have motivated a paradigm shift from static spectrum allocation towards a more 'liberalized' notion of spectrum management in which secondary users can borrow idle spectrum from primary spectrum licensees, without causing harmful interference to the latter- a notion commonly referred to as dynamic spectrum access (DSA) or open spectrum access (3), (82). Cognitive radio (30, 47), empowered by Software Defined Radio (SDR) (81), is poised to promote the efficient use of spectrum by adopting this open spectrum approach. In this dissertation, we first address the problem of dynamic channel (spectrum) access by a set of cognitive radio enabled nodes, where each node acting in a selfish manner tries to access and use as many channels as possible, subject to the interference constraints. We model the dynamic channel access problem as a modified Rubinstein-Stahl bargaining game. In our model, each node negotiates with the other nodes to obtain an agreeable sharing rule of the available channels, such that, no two interfering nodes use the same channel. We solve the bargaining game by finding Subgame Perfect Nash Equilibrium (SPNE) strategies of the nodes. First, we consider finite horizon version of the bargaining game and investigate its SPNE strategies that allow each node to maximize its utility against the other nodes (opponents).; We then extend these results to the infinite horizon bargaining game. Furthermore, we identify Pareto optimal equilibria of the game for improving spectrum utilization. The bargaining solution ensures that no node is starved of channels. The spectrum that a secondary node acquires comes to it at a cost. Thus it becomes important to study the 'end system' perspective of such a cost, by focusing on its implications. Specifically, we consider the problem of incentivizing nodes to provide the service of routing using the acquired spectrum. In this problem, each secondary node having a certain capacity incurs a cost for routing traffic through it. Secondary nodes will not have an incentive to relay traffic unless they are compensated for the costs they incur in forwarding traffic. We propose a path auction scheme in which each secondary node announces its cost and capacity to the routing mechanism, both of which are considered as private information known only to the node. We design a route selection mechanism and a pricing function that can induce nodes to reveal their cost and capacity honestly (making our auction truthful), while minimizing the payment that needs to be given to the nodes (making our auction optimal). By considering capacity constraint of the nodes, we explicitly support multiple path routing. For deploying our path auction based routing mechanism in DSA networks, we provide polynomial time algorithms to find the optimal route over which traffic should be routed and to compute the payment that each node should receive. All our proposed algorithms have been evaluated via extensive simulation experiments. These results help to validate our design philosophy and also illustrate the effectiveness of our solution approach.
ID: 030422691; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2011.; Includes bibliographical references (p. 161-166).
Ph.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
7

Fu, Kevin E. (Kevin Edward) 1976. "Group sharing and random access in cryptographic storage file systems." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80534.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Vita.
Includes bibliographical references (p. 79-83).
by Kevin E. Fu.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Haeyoung. "Dynamic spectrum sharing by opportunistic spectrum access with spectrum aggregation." Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/807078/.

Full text
Abstract:
The rapid growth of wireless services and the breakneck proliferation of wireless devices continue to strain limited spectrum resource. While the need for efficient spectrum sharing mechanisms has been emphasized, opportunistic spectrum access has been considered as a promising mechanism for dynamic spectrum sharing. However, although the idle spectrum could exist, it is usually rather fragmented and distributed, and hence the secondary network users would face the difficulty in finding required contiguous spectrum. Spectrum aggregation can be exploited to provide effective wide bandwidth communication but at the cost of complexity and overhead. When a primary network uses spectrum dynamically, from the nature of opportunistic spectrum access, collisions can occur between primary and secondary transmissions and spectrum handoff can be utilised to provide reliable communication. However, collision occurrence results in spectrum handoff delay in a secondary network user (SU) along with short-term interference to a primary network user (PU). As a SU accesses more spectrum for higher data rates by spectrum aggregation, collisions can occur more frequently and frequent spectrum handoff will be required. While spectrum aggregation will allow the SU to have high flexibility in spectrum use and spectrum handoff can help improve the reliability of secondary transmissions, the SU faces a new spectrum allocation problem: How wide and which parts of spectrum opportunities should be aggregated while considering the complexity and the overhead for aggregation and for spectrum handoff? This thesis addresses the key challenge of opportunistic spectrum access, focusing on efficient spectrum sharing considering the fragmentation of spectrum opportunities in frequency and time domains. First, considering complexity and overhead for aggregation, the spectrum aggregation approach is investigated and guidelines are derived how to reduce spectrum fragmentation for the efficient spectrum utilisation based on simulation results. Second, the relationship between collision occurrence and spectrum aggregation is analysed. Collision probabilities between primary and secondary transmissions are derived and the impacts of spectrum aggregation on data rates and spectrum handoff are investigated. Then, a spectrum aggregation algorithm is proposed to maximise data rates for a given collision probability threshold. Third, when considering spectrum handoff, the impacts of spectrum aggregation on spectrum handoff and short-term interference to PUs are analysed. Then, the spectrum aggregation algorithm is designed with the aim to minimise collision. Finally, the results of this study are summarised, conclusions are presented and a number of future research topics are proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Tercero, Vargas Miurel. "Topics in Dynamic Spectrum Access : Market Based Spectrum Sharing and Secondary User Access in Radar Bands." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33791.

Full text
Abstract:
The steady growth in demand for spectrum has increased research interest in dynamic spectrum access schemes. This thesis studies some challenges in dynamic spectrum access based on two strategies: open sharing and hierarchical access. (1) In the open sharing model, the channels are allocated based on an auction process, taking into account the propagation characteristics of the channels, termed as channel heterogeneity. Two distributed dynamic spectrum access schemes are evaluated, sequential and concurrent. We show that the concurrent accessmechanismperforms better in terms of channel utilization and energy consumption, especially in wireless cellular network with an energy constraint. (2) In the hierarchical model, we assess the opportunities for secondary access in the radar band at 5.6GHz. The primary user is a meteorological radar and WLANs are the secondary users. The secondary users implement an interference protection mechanism to protect the radar, such that the WLAN’s transmission is regulated by an interference threshold. We evaluate the aggregate interference caused to the radar from multiple WLANs transmitting. We derive a mathematicalmodel to approximate the probability distribution function of the aggregate interference at the primary user, considering two cases: when secondary users are homogeneously distributed, and when they are heterogeneously distributed. The heterogeneous distribution of secondary users is modeled using an annulus sector with a higher density, called a hot zone. Finally, we evaluate opportunities for secondary access when WLANs employ an interference protection mechanism that considers the radar’s antenna pattern, such that temporal opportunities for transmission exist. The analytical probability distribution function of the interference is verified showing a good agrement with a Monte Carlo simulation. We show that the aggregate interference is sensitive to the propagation environment, thus in the rural case interference is more severe when compared to the urban case. In the evaluation of the hot zonemodel, we observe that the heterogenous distribution of secondary users has impact on the aggregate interference if the hot zone is near to the radar. The mathematical framework presented in this thesis can easily be adapted to assess interference to other types of primary and secondary users.
QC 20110523
APA, Harvard, Vancouver, ISO, and other styles
10

Attia, Tarek. "Band sharing and satellite diversity techniques for CDMA." Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/842977/.

Full text
Abstract:
High levels of interference between satellite constellation systems, fading and shadowing are a major problem for the successful performance of communication systems using the allocated L/S frequency bands for Non-Geostationary Earth Orbit (NGEO) satellites. As free spectrum is nonexistent, new systems wishing to operate in this band must co-exist with other users, both satellite and terrestrial. This research is mainly concerned with two subjects. Firstly, band sharing between different systems Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) has been evaluated for maximizing capacity and optimising efficiency of using the spectrum available. For the case of widened channel bandwidth of the CDMA channel, the overlapping was tested under different degrees of channel overlap and different orders of filters. The best result shows that at the optimum degree of channel overlap, capacity increases by up to 21%. For the case of fixed channel bandwidth, the optimum overlapping between CDMA systems depends on the filtering Roll-off factor and achieves an improvement of the spectrum efficiency of up to 13.4%. Also, for a number of narrowband signal users sharing a CDMA channel, the best location of narrowband signals to share spectrum with a CDMA system was found to be at the edge of the CDMA channel. Simulation models have been constructed and developed which show the combination of DS- CDMA techniques, forward error correction (FEC) code techniques and satellite diversity with Rake receiver for improving performance of interference, fading and shadowing under different environments. Voice activity factor has been considered to reduce the effect of multiple access interference (MAI). The results have shown that satellite diversity has a significant effect on the system performance and satellite diversity gain achieves an improvement up to 6dB. Further improvements have been achieved by including concatenated codes to provide different BER for different services. Sharing the frequency band between a number of Low Earth Orbit (LEO) satellite constellation systems is feasible and very useful but only for a limited number of LEOS satellite CDMA based constellations. Furthermore, satellite diversity is an essential factor to achieve a satisfactory level of service availability, especially for urban and suburban environments.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Access sharing"

1

Holland, Oliver, Hanna Bogucka, and Arturas Medeisis, eds. Opportunistic Spectrum Sharing and White Space Access. Hoboken, NJ: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119057246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smagadi, Aphrodite. Medicinal bioprospecting: Policy options for access and benefit-sharing. London: British Institute of International and Comparative Law, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Committee, DHS Data Privacy and Integrity Advisory. A white paper: DHS information sharing and access agreements. Washington, DC: DHS Data Privacy and Integrity Advisory Committee, [2009?], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhatt, Seema, Suneetha M. Subramanian, and Sanjay Kabir Bavikatte. Community based experiences on access and benefit sharing: Case studies. Chennai: National Biodiversity Authority, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Regulating genetic resources: Access and benefit sharing in international law. Cheltenham, UK: Edward Elgar, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Regulating bioprospecting: Institutions for drug research, access, and benefit-sharing. Tokyo: United Nations University Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The Custodians of biodiversity: Sharing access and benefits to genetic resources. New York, NY: Earthscan, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Richerzhagen, Carmen. Protecting biological diversity: The effectiveness of access and benefit-sharing regimes. New York: Routledge, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Protecting biological diversity: The effectiveness of access and benefit-sharing regimes. New York: Routledge, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kwa, Eric L. Access and benefit sharing: Policy and legal implications for Papua New Guinea. Papua New Guinea: [Papua New Guinea Institute of Biodiversity?], 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Access sharing"

1

Carolan, Michael S. "The Promise of Access." In The Food Sharing Revolution, 55–69. Washington, DC: Island Press/Center for Resource Economics, 2018. http://dx.doi.org/10.5822/978-1-61091-887-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xin, ChunSheng, and Min Song. "Opportunistic Spectrum Access." In Spectrum Sharing for Wireless Communications, 7–16. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13803-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mayers, Scott, and Mike Lee. "Remote Access and Sharing." In Learn OS X Lion, 523–40. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3763-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weinmeister, Philip. "Access, Sharing, and Visibility." In Practical Guide to Salesforce Communities, 179–99. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3609-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xiang, Jie, Yan Zhang, and Tor Skeie. "Dynamic Spectrum Sharing in Cognitive Radio Femtocell Networks." In Access Networks, 164–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11664-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xin, ChunSheng, and Min Song. "Dynamic Spectrum Co-Access." In Spectrum Sharing for Wireless Communications, 33–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13803-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xin, ChunSheng, and Min Song. "On-Demand Spectrum Access." In Spectrum Sharing for Wireless Communications, 49–64. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13803-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Altrock, Sophie, and Ayoung Suh. "Sharing Economy Versus Access Economy." In Lecture Notes in Computer Science, 3–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58484-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xin, ChunSheng, and Min Song. "Incentivized Cooperative Dynamic Spectrum Access." In Spectrum Sharing for Wireless Communications, 17–31. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13803-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Miao, and Danny H. K. Tsang. "Efficient Spectrum Sharing in Cognitive Radio Networks with Implicit Power Control." In Access Networks, 149–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11664-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Access sharing"

1

Garcia-Luna-Aceves, J. J., and Dylan Cirimelli-Low. "Queue-Sharing Multiple Access." In MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3416010.3423230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

krichen, mariem, johanne cohen, and dominique barth. "Model For Sharing Femto Access." In 5th International ICST Conference on Performance Evaluation Methodologies and Tools. ACM, 2011. http://dx.doi.org/10.4108/icst.valuetools.2011.246071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaushik, Ankit, Felix Wunsch, Andrej Sagainov, Nicolas Cuervo, Johannes Demel, Sebastian Koslowski, Holger Jakel, and Friedrich Jondral. "Spectrum sharing for 5G wireless systems (Spectrum sharing challenge)." In 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2015. http://dx.doi.org/10.1109/dyspan.2015.7343841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rahman, Mostafizur, Syed Hassan Ahmed, and Murat Yuksel. "Proof of Sharing in Inter-Operator Spectrum Sharing Markets." In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2018. http://dx.doi.org/10.1109/dyspan.2018.8610473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"CHALLENGES FOR ACCESS CONTROL IN KNOWLEDGE FEDERATIONS." In International Conference on Knowledge Management and Information Sharing. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002331602240229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Chang, and Randall Berry. "Competition with Open Spectrum Access: Sharing vs. Unlicensed Access." In 9th International Conference on Cognitive Radio Oriented Wireless Networks. ICST, 2014. http://dx.doi.org/10.4108/icst.crowncom.2014.255739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rahman, Mostafizur, and Murat Yuksel. "Mobile Proof-of-Sharing Architectures for Inter-Operator Spectrum Sharing Markets." In 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2019. http://dx.doi.org/10.1109/dyspan.2019.8935683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reddy, L. Siva, and Munaga V. N. K. Prasad. "Multi-secret sharing threshold access structure." In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2015. http://dx.doi.org/10.1109/icacci.2015.7275839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mazurek, Michelle L., Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, et al. "Access control for home data sharing." In the 28th international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1753326.1753421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bettencourt, Nuno, Nuno Silva, and João Barroso. "Recommending Access Policies in Cross-domain Internet." In 7th International Conference on Knowledge Management and Information Sharing. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005600500500061.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Access sharing"

1

Paul Jehn and Ben Grunewald. Facilitating Oil Industry Access to Federal Lands through Interagency Data Sharing. Office of Scientific and Technical Information (OSTI), May 2007. http://dx.doi.org/10.2172/927589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ruiz Muller, Manuel. Thinking Outside the Box Innovative Options for an Operational Regime on Access and Benefit Sharing. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2010. http://dx.doi.org/10.7215/nr_ip_20100708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Velez, Eduardo. Brazil’s Practical Experience with Access and Benefit Sharing and the Protection of Traditional Knowledge. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2010. http://dx.doi.org/10.7215/nr_pb_20100708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hiemstra, Sipke Joost, Martin Brink, and Theo van Hintum. Digital Sequence Information (DSI) : Options and impact of regulating access and benefit sharing - stakeholder perspectives. Wageningen: Centre for Genetic Resources, the Netherlands (CGN), Wageningen University & Research, 2019. http://dx.doi.org/10.18174/470286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Foreit, James, and Sarah Raifman. Increasing access to family planning (FP) and reproductive health (RH) services through task-sharing between community health workers (CHWs) and community mid-level professionals in large-scale public-sector programs: A literature review to help guide case studies. Population Council, 2011. http://dx.doi.org/10.31899/rh1.1014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

García-Espinosa, J., and C. Soriano. Data management plan. Scipedia, 2021. http://dx.doi.org/10.23967/prodphd.2021.9.003.

Full text
Abstract:
This document presents the deliverable D8.1 – the Data Management Plan (DMP) of work package 8 of the prodPhD project. It aims to present the plan for the management, generation, collection, security, preservation and sharing of data generated through the prodPhD project. The DMP is a key element for organizing the project’s data. It provides an analysis of the data, which will be collected, processed and published by the prodPhD consortium. The project embraces the initiatives of the European Commission to promote the open access to research data, aiming to improve and maximize access to and reuse of research data generated by Horizon 2020 projects. In this sense prodPhD will adhere to the Open Research Data Pilot (ORD Pilot) fostered by the European Commission, and this DMP will be developed following the standards of data storage, access and management. This plan will detail what data will be generated through the project, whether and how it will be made accessible for the verification and reuse and how it will be curated and preserved. In this context, the term data applies to the information generated during the different experimental campaigns carried out in the project, and specifically to the data, including associated metadata, to be used to validate the computational models and the technical solutions to be developed in the project. This document is the first version of the DMP and may be updated throughout the project, if significant changes (new data, changes in consortium policies, changes in consortium composition, etc.) arise.
APA, Harvard, Vancouver, ISO, and other styles
7

Osidoma, Japhet, and Ashiru Mohammed Kinkwa. Creatively Improving Agricultural Practices and Productivity: Pro Resilience Action (PROACT) project, Nigeria. Oxfam, February 2021. http://dx.doi.org/10.21201/2021.7260.

Full text
Abstract:
Since April 2016, The European Union and the Oxfam Pro-Resilience Action Project in Kebbi and Adamawa States, Nigeria, have supported poor smallholder rural farmers to improve their agricultural productivity. The project has a specific focus on increasing crop yields per hectare for better land usage, as well as ensuring farmers possess the skills they need to maintain good agricultural practices, such as inputs utilization and climate mitigation strategies, as well as an information-sharing system on weather and market prices. The project uses a Farmer Field School model that continues to serve as a viable platform for rural farmers to access hands-on skills and basic modern farming knowledge and techniques. The case studies presented here demonstrate a significant increase in farmers’ productivity, income and resilience. This approach should be emulated by governments and private sector players to achieve impact at scale in Nigeria’s agricultural sector, which is the country’s top non-oil revenue stream.
APA, Harvard, Vancouver, ISO, and other styles
8

Increasing access to family planning in Ghana through policy change: Task-sharing to enable auxiliary nurses to provide contraceptive implant services. Population Council, 2014. http://dx.doi.org/10.31899/rh10.1014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Full text
Abstract:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&D), academies of science, ministries of science and technology, policies, recognition of research, and participation in the Science Granting Councils Initiative (SGCI), the following countries demonstrate the highest commitment and political willingness to invest in science: Botswana, Ethiopia, Kenya, Senegal, South Africa, Tanzania, and Uganda. In addition to existing policies in Science, Technology and Innovation (STI), the following countries have made progress towards Open Data policies: Botswana, Kenya, Madagascar, Mauritius, South Africa and Uganda. Only two African countries (Kenya and South Africa) at this stage contribute 0.8% of its GDP (Gross Domestic Product) to R&D (Research and Development), which is the closest to the AU’s (African Union’s) suggested 1%. Countries such as Lesotho and Madagascar ranked as 0%, while the R&D expenditure for 24 African countries is unknown. In addition to this, science globally has become fully dependent on stable ICT (Information and Communication Technologies) infrastructure, which includes connectivity/bandwidth, high performance computing facilities and data services. This is especially applicable since countries globally are finding themselves in the midst of the 4th Industrial Revolution (4IR), which is not only “about” data, but which “is” data. According to an article1 by Alan Marcus (2015) (Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum), “At its core, data represents a post-industrial opportunity. Its uses have unprecedented complexity, velocity and global reach. As digital communications become ubiquitous, data will rule in a world where nearly everyone and everything is connected in real time. That will require a highly reliable, secure and available infrastructure at its core, and innovation at the edge.” Every industry is affected as part of this revolution – also science. An important component of the digital transformation is “trust” – people must be able to trust that governments and all other industries (including the science sector), adequately handle and protect their data. This requires accountability on a global level, and digital industries must embrace the change and go for a higher standard of protection. “This will reassure consumers and citizens, benefitting the whole digital economy”, says Marcus. A stable and secure information and communication technologies (ICT) infrastructure – currently provided by the National Research and Education Networks (NRENs) – is key to advance collaboration in science. The AfricaConnect2 project (AfricaConnect (2012–2014) and AfricaConnect2 (2016–2018)) through establishing connectivity between National Research and Education Networks (NRENs), is planning to roll out AfricaConnect3 by the end of 2019. The concern however is that selected African governments (with the exception of a few countries such as South Africa, Mozambique, Ethiopia and others) have low awareness of the impact the Internet has today on all societal levels, how much ICT (and the 4th Industrial Revolution) have affected research, and the added value an NREN can bring to higher education and research in addressing the respective needs, which is far more complex than simply providing connectivity. Apart from more commitment and investment in R&D, African governments – to become and remain part of the 4th Industrial Revolution – have no option other than to acknowledge and commit to the role NRENs play in advancing science towards addressing the SDG (Sustainable Development Goals). For successful collaboration and direction, it is fundamental that policies within one country are aligned with one another. Alignment on continental level is crucial for the future Pan-African African Open Science Platform to be successful. Both the HIPSSA ((Harmonization of ICT Policies in Sub-Saharan Africa)3 project and WATRA (the West Africa Telecommunications Regulators Assembly)4, have made progress towards the regulation of the telecom sector, and in particular of bottlenecks which curb the development of competition among ISPs. A study under HIPSSA identified potential bottlenecks in access at an affordable price to the international capacity of submarine cables and suggested means and tools used by regulators to remedy them. Work on the recommended measures and making them operational continues in collaboration with WATRA. In addition to sufficient bandwidth and connectivity, high-performance computing facilities and services in support of data sharing are also required. The South African National Integrated Cyberinfrastructure System5 (NICIS) has made great progress in planning and setting up a cyberinfrastructure ecosystem in support of collaborative science and data sharing. The regional Southern African Development Community6 (SADC) Cyber-infrastructure Framework provides a valuable roadmap towards high-speed Internet, developing human capacity and skills in ICT technologies, high- performance computing and more. The following countries have been identified as having high-performance computing facilities, some as a result of the Square Kilometre Array7 (SKA) partnership: Botswana, Ghana, Kenya, Madagascar, Mozambique, Mauritius, Namibia, South Africa, Tunisia, and Zambia. More and more NRENs – especially the Level 6 NRENs 8 (Algeria, Egypt, Kenya, South Africa, and recently Zambia) – are exploring offering additional services; also in support of data sharing and transfer. The following NRENs already allow for running data-intensive applications and sharing of high-end computing assets, bio-modelling and computation on high-performance/ supercomputers: KENET (Kenya), TENET (South Africa), RENU (Uganda), ZAMREN (Zambia), EUN (Egypt) and ARN (Algeria). Fifteen higher education training institutions from eight African countries (Botswana, Benin, Kenya, Nigeria, Rwanda, South Africa, Sudan, and Tanzania) have been identified as offering formal courses on data science. In addition to formal degrees, a number of international short courses have been developed and free international online courses are also available as an option to build capacity and integrate as part of curricula. The small number of higher education or research intensive institutions offering data science is however insufficient, and there is a desperate need for more training in data science. The CODATA-RDA Schools of Research Data Science aim at addressing the continental need for foundational data skills across all disciplines, along with training conducted by The Carpentries 9 programme (specifically Data Carpentry 10 ). Thus far, CODATA-RDA schools in collaboration with AOSP, integrating content from Data Carpentry, were presented in Rwanda (in 2018), and during17-29 June 2019, in Ethiopia. Awareness regarding Open Science (including Open Data) is evident through the 12 Open Science-related Open Access/Open Data/Open Science declarations and agreements endorsed or signed by African governments; 200 Open Access journals from Africa registered on the Directory of Open Access Journals (DOAJ); 174 Open Access institutional research repositories registered on openDOAR (Directory of Open Access Repositories); 33 Open Access/Open Science policies registered on ROARMAP (Registry of Open Access Repository Mandates and Policies); 24 data repositories registered with the Registry of Data Repositories (re3data.org) (although the pilot project identified 66 research data repositories); and one data repository assigned the CoreTrustSeal. Although this is a start, far more needs to be done to align African data curation and research practices with global standards. Funding to conduct research remains a challenge. African researchers mostly fund their own research, and there are little incentives for them to make their research and accompanying data sets openly accessible. Funding and peer recognition, along with an enabling research environment conducive for research, are regarded as major incentives. The landscape report concludes with a number of concerns towards sharing research data openly, as well as challenges in terms of Open Data policy, ICT infrastructure supportive of data sharing, capacity building, lack of skills, and the need for incentives. Although great progress has been made in terms of Open Science and Open Data practices, more awareness needs to be created and further advocacy efforts are required for buy-in from African governments. A federated African Open Science Platform (AOSP) will not only encourage more collaboration among researchers in addressing the SDGs, but it will also benefit the many stakeholders identified as part of the pilot phase. The time is now, for governments in Africa, to acknowledge the important role of science in general, but specifically Open Science and Open Data, through developing and aligning the relevant policies, investing in an ICT infrastructure conducive for data sharing through committing funding to making NRENs financially sustainable, incentivising open research practices by scientists, and creating opportunities for more scientists and stakeholders across all disciplines to be trained in data management.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography