Journal articles on the topic 'Access sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Access sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Simpson, Donald B. "Resource Sharing = Access + Ownership:." Journal of Library Administration 20, no. 1 (March 27, 1995): 95–107. http://dx.doi.org/10.1300/j111v20n01_08.
Full textCornaglia, Bruno, Gavin Young, and Antonio Marchetta. "Fixed Access Network Sharing." Optical Fiber Technology 26 (December 2015): 2–11. http://dx.doi.org/10.1016/j.yofte.2015.07.008.
Full textKarr, Alan F. "Data Sharing and Access." Annual Review of Statistics and Its Application 3, no. 1 (June 2016): 113–32. http://dx.doi.org/10.1146/annurev-statistics-041715-033438.
Full textKerpez, Kenneth J., John M. Cioffi, Peter J. Silverman, Bruno Cornaglia, and Gavin Young. "Fixed Access Network Sharing." IEEE Communications Standards Magazine 1, no. 1 (March 2017): 82–89. http://dx.doi.org/10.1109/mcomstd.2017.1600001st.
Full textLyu, Yan, Victor C. S. Lee, Chi-Yin Chow, Joseph Kee-Yin Ng, Yanhua Li, and Jia Zeng. "R-Sharing: Rendezvous for Personalized Taxi Sharing." IEEE Access 6 (2018): 5023–36. http://dx.doi.org/10.1109/access.2017.2778221.
Full textMouw, James. "Access, ownership and resource sharing." Serials Review 22, no. 2 (June 1996): 95–96. http://dx.doi.org/10.1080/00987913.1996.10764314.
Full textWicks, P. "Sharing access might increase engagement." BMJ 341, dec20 2 (December 20, 2010): c7209. http://dx.doi.org/10.1136/bmj.c7209.
Full textOwens, Brian. "Data sharing: Access all areas." Nature 533, no. 7602 (May 2016): S71—S72. http://dx.doi.org/10.1038/533s71a.
Full textStępnicka, Nina, and Paulina Wiączek. "ACCESS ECONOMY AND SHARING ECONOMY IN THE LIGHT OF THE INNOVATION THEORY." PRACE NAUKOWE UNIWERSYTETU EKONOMICZNEGO WE WROCŁAWIU, no. 509 (2018): 396–405. http://dx.doi.org/10.15611/pn.2018.509.33.
Full textPosner, Beth, Jennifer DeVito, Katharine Haldeman, and Dennis Massie. "Reciprocal On-Site Access: Sharing Information by Sharing Library Spaces." Journal of Library Administration 60, no. 1 (January 2, 2020): 80–87. http://dx.doi.org/10.1080/01930826.2019.1685270.
Full textBegg, Norman. "Securely sharing access to sensitive data." Network Security 2013, no. 7 (July 2013): 15–18. http://dx.doi.org/10.1016/s1353-4858(13)70083-7.
Full textBarbosa, V. C., M. R. F. Benevides, and F. M. G. França. "Sharing Resources at Nonuniform Access Rates." Theory of Computing Systems 34, no. 1 (February 2000): 13–26. http://dx.doi.org/10.1007/s002240010008.
Full textTrevor, Jonathan, and David M. Hilbert. "AnySpot: Pervasive Document Access and Sharing." IEEE Pervasive Computing 6, no. 3 (July 2007): 76–84. http://dx.doi.org/10.1109/mprv.2007.50.
Full textJuergens, Bonnie, and Tim Prather. "The Resource Sharing Component of Access." Journal of Library Administration 20, no. 1 (March 27, 1995): 77–94. http://dx.doi.org/10.1300/j111v20n01_07.
Full textMaher, Diane. "Access, resource sharing and collection development." Serials Review 23, no. 3 (September 1997): 93–94. http://dx.doi.org/10.1080/00987913.1997.10764402.
Full textGarrison, Nanibaa' A., Krysta S. Barton, Kathryn M. Porter, Thyvu Mai, Wylie Burke, and Stephanie Russo Carroll. "Access and Management: Indigenous Perspectives on Genomic Data Sharing." Ethnicity & Disease 29, Supp (December 12, 2019): 659–68. http://dx.doi.org/10.18865/ed.29.s3.659.
Full textNordin, R., K. H. Hassan, Z. A. Zainol, R. Shapiee, F. Jalil, M. A. Witbrodt, and M. S. Hassan. "Regulating Access to Genetic Resources and the Sharing of Benefit Through the Sarawak Access Benefit-Sharing Legislation." Research Journal of Applied Sciences 7, no. 3 (March 1, 2012): 185–93. http://dx.doi.org/10.3923/rjasci.2012.185.193.
Full textPereira, Stacey, Richard Gibbs, and Amy McGuire. "Open Access Data Sharing in Genomic Research." Genes 5, no. 3 (August 29, 2014): 739–47. http://dx.doi.org/10.3390/genes5030739.
Full textBYUNG-WOON LYOU. "Access to Genetic Resources and Benefit Sharing." Journal of hongik law review 18, no. 2 (June 2017): 59–88. http://dx.doi.org/10.16960/jhlr.18.2.201706.59.
Full textJammalamadaka, Ravi Chandra, Sharad Mehrotra, Nalini Venkatasubramanian, and Kent Seamons. "DataVault: secure mobile access and data sharing." Network Security 2011, no. 5 (May 2011): 16–19. http://dx.doi.org/10.1016/s1353-4858(11)70052-6.
Full textShabani, Mahsa, Danya Vears, and Pascal Borry. "Raw Genomic Data: Storage, Access, and Sharing." Trends in Genetics 34, no. 1 (January 2018): 8–10. http://dx.doi.org/10.1016/j.tig.2017.10.004.
Full textSaez, G., and C. Padro. "Secret sharing schemes with bipartite access structure." IEEE Transactions on Information Theory 46, no. 7 (2000): 2596–604. http://dx.doi.org/10.1109/18.887867.
Full textPritting, Shannon, William Jones, Timothy Jackson, and Michael Mulligan. "Enhancing Resource Sharing Access Through System Integration." Journal of Interlibrary Loan, Document Delivery & Electronic Reserve 26, no. 1 (January 1, 2017): 11–24. http://dx.doi.org/10.1080/1072303x.2017.1305034.
Full textYozwiak, Nathan L., Stephen F. Schaffner, and Pardis C. Sabeti. "Data sharing: Make outbreak research open access." Nature 518, no. 7540 (February 2015): 477–79. http://dx.doi.org/10.1038/518477a.
Full textChen, Hao, San Ling, and Chaoping Xing. "Access Structures of Elliptic Secret Sharing Schemes." IEEE Transactions on Information Theory 54, no. 2 (February 2008): 850–52. http://dx.doi.org/10.1109/tit.2007.913508.
Full textGómez-Castro, Beatriz, and Regina Kipper. "Nagoya Protocol on Access and Benefit-Sharing." Microbiology Australia 40, no. 3 (2019): 103. http://dx.doi.org/10.1071/ma19028.
Full textDhar, Biswajit, and R. V. Anuradha. "Access, Benefit-Sharing and Intellectual Property Rights." Journal of World Intellectual Property 7, no. 5 (November 1, 2005): 597–639. http://dx.doi.org/10.1111/j.1747-1796.2004.tb00221.x.
Full textQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Secret Sharing Scheme on Access Structure." Applied Mechanics and Materials 571-572 (June 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.
Full textHarinarayan, Venkatesh, and Leonard Kleinrock. "Load sharing in limited access distributed systems." ACM SIGMETRICS Performance Evaluation Review 19, no. 1 (June 2, 1991): 21–30. http://dx.doi.org/10.1145/107972.107975.
Full textIto, Mitsuru, Akira Saito, and Takao Nishizeki. "Secret sharing scheme realizing general access structure." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 72, no. 9 (1989): 56–64. http://dx.doi.org/10.1002/ecjc.4430720906.
Full textDufva, Martin. "Open access will deter illegal file-sharing." Nature 426, no. 6962 (November 2003): 15. http://dx.doi.org/10.1038/426015c.
Full textWang, Xianfang, Can Xiang, and Fang-Wei Fu. "Secret sharing schemes for compartmented access structures." Cryptography and Communications 9, no. 5 (September 20, 2016): 625–35. http://dx.doi.org/10.1007/s12095-016-0205-6.
Full textPriazhkina, Sofia, and Frank H. Page. "Sharing market access in buyer–seller networks." Journal of Economic Theory 175 (May 2018): 415–46. http://dx.doi.org/10.1016/j.jet.2018.01.017.
Full textYang, Siman, Hongfeng Wu, and Jiyou Li. "Access structures of hyperelliptic secret sharing schemes." Finite Fields and Their Applications 37 (January 2016): 46–53. http://dx.doi.org/10.1016/j.ffa.2015.09.002.
Full textHarn, Lein, Chingfang Hsu, Mingwu Zhang, Tingting He, and Maoyuan Zhang. "Realizing secret sharing with general access structure." Information Sciences 367-368 (November 2016): 209–20. http://dx.doi.org/10.1016/j.ins.2016.06.006.
Full textBaldini, Gianmarco, Igor Nai Fovino, Stefano Braghin, and Alberto Trombetta. "Distributed access control policies for spectrum sharing." Security and Communication Networks 6, no. 8 (September 19, 2012): 925–35. http://dx.doi.org/10.1002/sec.629.
Full textCao, Hao, and Wenping Ma. "Verifiable Threshold Quantum State Sharing Scheme." IEEE Access 6 (2018): 10453–57. http://dx.doi.org/10.1109/access.2018.2805724.
Full textYe, Yun, Dalei Wu, Zhihui Shu, and Yi Qian. "Overview of LTE Spectrum Sharing Technologies." IEEE Access 4 (2016): 8105–15. http://dx.doi.org/10.1109/access.2016.2626719.
Full textZhou, Zhili, Ching-Nung Yang, Yi Cao, and Xingming Sun. "Secret Image Sharing Based on Encrypted Pixels." IEEE Access 6 (2018): 15021–25. http://dx.doi.org/10.1109/access.2018.2811722.
Full textLi, Wen Ming, and Liang Feng Zhang. "Towards Efficient Information-Theoretic Function Secret Sharing." IEEE Access 8 (2020): 28512–23. http://dx.doi.org/10.1109/access.2020.2971722.
Full textZhang, Sen, and Weiwei Ni. "Graph Embedding Matrix Sharing With Differential Privacy." IEEE Access 7 (2019): 89390–99. http://dx.doi.org/10.1109/access.2019.2927365.
Full textLiu, Wenjie, Yinsong Xu, Maojun Zhang, Junxiu Chen, and Ching-Nung Yang. "A Novel Quantum Visual Secret Sharing Scheme." IEEE Access 7 (2019): 114374–84. http://dx.doi.org/10.1109/access.2019.2931073.
Full textDiaz-Sanchez, Daniel, Andres Marin, Florina Almenarez, and Alberto Cortes. "Sharing conditional access modules through the home network for pay TV access." IEEE Transactions on Consumer Electronics 55, no. 1 (February 2009): 88–96. http://dx.doi.org/10.1109/tce.2009.4814419.
Full textDyke, Stephanie O. M., Katie M. Saulnier, Tomi Pastinen, Guillaume Bourque, and Yann Joly. "Evolving data access policy: The Canadian context." FACETS 1, no. 1 (March 1, 2017): 138–47. http://dx.doi.org/10.1139/facets-2016-0002.
Full textBaich, Tina. "Open access: help or hindrance to resource sharing?" Interlending & Document Supply 43, no. 2 (May 18, 2015): 68–75. http://dx.doi.org/10.1108/ilds-01-2015-0003.
Full textBoué, Stéphanie, Michael Byrne, A. Wallace Hayes, Julia Hoeng, and Manuel C. Peitsch. "Embracing Transparency Through Data Sharing." International Journal of Toxicology 37, no. 6 (October 3, 2018): 466–71. http://dx.doi.org/10.1177/1091581818803880.
Full textFathimal, P. Mohamed, and P. Arockia Jansi Rani. "Threshold Secret Sharing Scheme for Compartmented Access Structures." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 1–9. http://dx.doi.org/10.4018/ijisp.2016070101.
Full textWANG, Xianfang, Fang-Wei FU, and Xuan GUANG. "Probabilistic Secret Sharing Schemes for Multipartite Access Structures." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E99.A, no. 4 (2016): 856–62. http://dx.doi.org/10.1587/transfun.e99.a.856.
Full textPatil, Sonali, and Prashant Deshmukh. "General Access Structure Secret Sharing in Matrix Projection." International Journal of Computer Applications 107, no. 13 (December 18, 2014): 6–9. http://dx.doi.org/10.5120/18809-0369.
Full textVP, Binu, and Sreekumar A. "Efficient Multi Secret Sharing with Generalized Access Structures." International Journal of Computer Applications 90, no. 12 (March 26, 2014): 1–6. http://dx.doi.org/10.5120/15769-4446.
Full text