Dissertations / Theses on the topic 'Access'

To see the other types of publications on this topic, follow the link: Access.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Conocimiento, Dirección de Gestión del. "Guía de acceso para Access Engineering." McGraw-Hill, 2021. http://hdl.handle.net/10757/655256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Conocimiento, Dirección de Gestión del. "Guía de acceso para Access Medicine." McGraw-Hill, 2021. http://hdl.handle.net/10757/655257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Conocimiento, Dirección de Gestión del. "Guía de acceso para Access Physiotherapy." McGraw-Hill, 2021. http://hdl.handle.net/10757/655258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
O uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
APA, Harvard, Vancouver, ISO, and other styles
5

Atkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Byrnes, Collin DeMeere. "Access." This title; PDF viewer required Home page for entire collection, 2007. http://archives.udmercy.edu:8080/dspace/handle/10429/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.

Full text
Abstract:
When classified data of different classifications are stored in a database, it is necessary for a contemporary database system to pass through other classified data to find the properly classified data. Although the user of the system may only see data classified at the user's level, the database system itself has breached the security by bringing the other classified data into the main memory from secondary storage. Additionally, the system is not efficient as it could be because unnecessary material has been retrieved. This is a problem in access precision. This thesis proposes a solution to the access precision and pass-through problems using a database counterpart to the mathematical concept of equivalence relations. Each record of the database contains at least one security attribute (e.g., classification) and the database is divided into compartments of records; Compartments are disjoint sets, where each compartment of records has the same aggregate of security attributes. A suitable database model, the Attribute-Based Data Model, is selected, and an example of implementation is provided. Keywords: Database security; Multilevel security; Computer security. (Theses)
APA, Harvard, Vancouver, ISO, and other styles
8

GOMES, CARMEN ANTUNES. "RANDON ACCESS WITH NOTIFICATION: MULTIPLE ACCESS PROTOCOLS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1993. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9396@1.

Full text
Abstract:
FURNAS CENTRAIS ELÉTRICAS S.A
Este trabalho propõe e analisa uma versão de um protocolo híbrido de acesso aleatório com notificação, desenvolvido para redes VSAT ( Very Small Aperture Terminal) onde se busca uma combinação do baixo tempo de resposta de protocolos do tipo RA-TDMA (Random Access-Time Division Multiple Access) . No protocolo aqui estudado as transmissões são feitas em uma primeira tentativa através de um esquema RA-TDMA e no caso de ocorrência de colisão, os pacotes envolvidos são retransmitidos através de um esquema DA-TDMA. As notificações de transmissões são feitas pelas estações VSAT, através de um canal de sinalização, onde é atribuído a cada uma delas um segmento de tempo, aqui referido como slot de tempo, de posição fixa dentro de cada quadro. O desempenho do protocolo é analisado utilizando a técnica de Análise no Ponto de Equilíbrio (EPA), sendo considerados como medida de desempenho os parâmetros retardo médio de mensagem, vazão e taxa de rejeição de pacotes. São consideradas mensagens de um pacote e mensagens de tamanho variável. Comparações com outros protocolos contendo buffer ou não, também analisados utilizando a técnica EPA, são realizadas. Resultados de simulação encontrados na literatura de dois outros protocolos são também apresentados.
A version of a random access with notification, multiple access protocol developed for VSAT networks is considered. This hybrid protocol combines the low response delay of RA- TDMA contention protocols with the efficiency and stability of DA-TDMA type protocols. In the considered protocol a message generated by a VSAT station is transmitted, in a first attempt, using a RA-TDMA type of scheme. If a collision occurs in this first transmission of the message the collided packets are retransmitted through a Demand Assignment (DA)-TDMA type of access. When a remote station transmits its message in a RA-TDMA contention mode it notifies the central hub using a separate TDMA channel in which a fixed position time slot is reserved to each station within a frame. The performance of the protocol is evaluated in terms of throughput, expected delay and packet rejection rate by means of the so called Equiilibrium Point Analysis (EPA). Single and multi-packet messages, with a random number of packets, are considered in the performance analysis. Comparisons with other hybrid protocols, which were also evaluated in the literature by means of the EPA technique or through simulation results, are presented.
APA, Harvard, Vancouver, ISO, and other styles
9

Brown, Trevor Junior. "Time division multiple access/code division multiple access for the optical local access network." Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kottahachchi, Buddhika. "ACCESS : Access Controls for Cooperatively Enabled Smart Spaces." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32101.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaves 75-79).
Traditionally, access control mechanisms have been static in nature, requiring explicit intervention in order to change their behavior. However, since security requirements can be expected to change frequently and rapidly in ubiquitous computing environments, access control mechanisms that can react to the context in which they are applied are desirable. With this in mind, we have created ACCESS (Access Controls for Cooperatively Enabled Smart Spaces); a framework for enabling dynamic, role-based and context-aware access control mechanisms in ubiquitous computing applications.
by Buddhika Kottahachchi.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
11

Näder, Johannes. "Open Access." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-160760.

Full text
Abstract:
Seit der Jahrtausendwende prägt das Schlagwort Open Access die Debatten um wissenschaftliches Publizieren. Je nach Kontext geht es dabei um handfeste Strategien angesichts der Zeitschriftenkrise, um ein mehr oder weniger einheitliches Programm zur Verabschiedung des Gutenberg-Zeitalters oder um visionäre Vorstellungen digitaler Wissenskulturen. Die Untersuchung verfolgt zwei Ziele: Zunächst erklärt sie, auf welche Konzepte sich der Begriff Open Access bezieht, wie sich diese Konzepte entwickelt haben und wie sie zusammenfassend beschrieben werden können. Diese Betrachtungsweise ermöglicht es, Open Access in einem zweiten Schritt aus seiner strategischen und programmatischen Funktionalisierung zu lösen und medien-/kulturwissenschaftlich zu deuten: Nicht zufällig entsteht die Open-Access-Bewegung zu einem Zeitpunkt, da sich die medientechnischen Infrastrukturen der Gesellschaft und damit auch der Wissenschaft tiefgreifend verändern. Die Untersuchung analysiert Open Access als den Versuch der Wissenschaftsgemeinschaft, durch die Beeinflussung des Mediensystems auch unter veränderten medialen Bedigungen wissenschaftliche Öffentlichkeit herstellen zu können und dabei Verwerfungen für wissenschaftliche Arbeitsabläufe und für das gesamte Wissenssystem zu vermeiden. Dabei wird deutlich, dass verschiedene Disziplinen unterschiedliche Anforderungen an wissenschaftliche Öffentlichkeit haben und dass daher Aushandlungsprozesse nötig sind. Gleichzeitig reflektiert die Untersuchung, dass es sich bei den gerade entstehenden neuen Medieninfrastrukturen genau wie beim sich wandelnden wissenschaftlichen Publikationswesen um fragile, grundsätzlich kontingente Strukturen handelt, deren Zukunft keineswegs gesichert ist: Statt Open Access könnten sich auch andere Organisationsformen wissenschaftlicher Öffentlichkeit im digitalen Zeitalter etablieren, die aber nicht unbedingt im Sinne eines offenen und produktiven wissenschaftlichen Austausches und einer breiten gesellschaftlichen Partizipation an wissenschaftlicher Kultur sein müssen. Open Access erscheint vor diesem Hintergrund als vorsichtiger und vergleichweise schadensarmer Aushandlungsprozess, nicht als radikale Revolution des Wissenschaftssystems an der Schwelle zum digitalen Zeitalter. Methodisch knüpft die Untersuchung an die Mediologie an, die durch die Beschreibung von Wechselwirkungen zwischen technischen Medien und kulturellen Praxen die Konstruktion einseitiger Kausalzusammenhänge vermeiden will. In einem Exkurs wird untersucht, worin sich die Konzepte von Open Access und Open Source bzw. Freier Software unterscheiden. Der Anhang der Arbeit enthält den Volltext der drei Erklärungen von Budapest, Bethesda und Berlin, in denen wichtige Prinzipien von Open Access niedergelegt sind.
APA, Harvard, Vancouver, ISO, and other styles
12

Conocimiento, Dirección de Gestión del. "Access Engineering." McGraw-Hill, 2004. http://hdl.handle.net/10757/655256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Conocimiento, Dirección de Gestión del. "Access Medicine." McGraw-Hill, 2004. http://hdl.handle.net/10757/655257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Conocimiento, Dirección de Gestión del. "Access Physiotherapy." McGraw-Hill, 2004. http://hdl.handle.net/10757/655258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Renfro, Garry D. "Present Access." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etd/2112.

Full text
Abstract:
The artist discusses his Master of Fine Arts exhibition, Present Access, hosted by The Carroll Reece Museum on the campus of East Tennessee State University, Johnson City, Tennessee, from April 2 through April 25, 2007. This exhibit contains works that span his four-year tenure in the graduate program and represent several iterations of the artist's exploration of the landscape as metaphor and discovery. Subjects discussed explicate the development of thought and process leading to the pieces presented in this exhibition. Topics explored include the importance of form, material, media, research, personal history, experience, and memory. Also considered are the influences of contemporary artists such as Tula Telfair, April Gornick, Toba Khedoori, Ying Kit Chan, and Rackstraw Downes; the poetry of T. S. Eliot; the ideas of Theoretical Physics and philosopher Paul Crowther.
APA, Harvard, Vancouver, ISO, and other styles
16

Adams, Stephanie Kathryn. "Disability, access and design : a study of wheelchair access." Thesis, Bournemouth University, 2006. http://eprints.bournemouth.ac.uk/17784/.

Full text
Abstract:
The aim of this study is to determine wheelchair user's views about access and ascertain whether designers are able to contribute to issues pertaining to inclusion through design solutions. Popular constructions of disability have established a relatively powerless and deviant status for the disabled population when compared to their able bodied peers. Regulatory controls and legislation require that builders and designers are sensitised to the needs of disabled people, but there is no legislative process to endorse disabled peoples request for a fully inclusive and accessible lifestyle. The enquiry is divided into two phases. The first phase considers access issues from a sample of wheelchair users via the use of focus groups and individual interviews. The data attained and information collated for the literature review leads the author to conclude that designers should consult with end users throughout the design process. During the second phase of the study the author proposes a model of inclusive design and an associated design resource. The author advocates that this is to be used by designers and development professionals to ensure inclusion within society is attained for all sectors of the community. The study concludes that, historically, society has responded to the needs of the disabled by providing separate and special services based on each individual's impairment, as opposed to the promotion of an equitable lifestyle for all. Inclusive design focuses on the design of the environment and not individual impairments. It is a process that promotes inclusivity for all sectors of society regardless of age, race, gender, sexuality or disability. Its principles consider diversity, and provides for an inclusive environment that can help break down barriers and exclusion as everyone will benefit from the end result.
APA, Harvard, Vancouver, ISO, and other styles
17

De, Obaldía Lee Galileo E. "Multiple access techniques for emerging broadband wireless access networks." Thesis, University of York, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.403800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

McMurry, Benjamin L. "Self-Access Centers: Maximizing Learners' Access to Center Resources." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd966.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Helberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /." [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Voigt, Janina. "Access contracts : a dynamic approach to object-oriented access protection." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bove, Jens. "Open Access 2.0." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:14-ds-1237556606026-59807.

Full text
Abstract:
Open Access bezeichnet den Wunsch, wissenschaftliche Literatur und Materialien im Internet prinzipiell frei zugänglich zu machen. Die Open Access-Bewegung hat sich in den 1990er Jahren unter dem Druck der steigenden Preise für wissenschaftliche Publikationen bei gleichzeitig stagnierenden oder schrumpfenden Bibliotheksetats entwickelt. Mit der „Berliner Erklärung über offenen Zugang zu wissenschaftlichem Wissen“ von 2003 richtet sich die Forderung über die freie Zugänglichkeit wissenschaftlicher Zeitschriftenliteratur hinaus ausdrücklich auch auf andere Kulturgüter in Archiven, Bibliotheken und Museen.
APA, Harvard, Vancouver, ISO, and other styles
22

May, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hungin, A. Pali S. "Open access gastroscopy." Thesis, University of Newcastle Upon Tyne, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.295539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Salow, Bernhard 1988. "Access and anticipation." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101524.

Full text
Abstract:
Thesis: Ph. D. in Linguistics, Massachusetts Institute of Technology, Department of Linguistics and Philosophy, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 119-126).
Can we always tell, just through reflection, what we should believe? That is the question of access, the central disagreement between epistemic internalists and externalists, and the focus of the dissertation. Chapter 1 gives an argument for access, connecting it with the question of whether we can intentionally bias our own investigations to favour desirable hypotheses. I argue that we can't: since we have to take any known biases into account when evaluating the evidence obtained, attempts to bias our inquiries will be self-undermining. Surprisingly, this explanation fails for agents who anticipate violating access; and such agents can in fact intentionally bias their investigations. Since this possibility remains counterintuitive when we focus on alleged counterexamples to access, this is a serious problem for externalism. Chapters 2 and 3 offer a solution to this problem and related, more familiar, ones. Chapter 2 lays some technical foundations, by investigating iterated knowledge in David Lewis's contextualist theory of knowledge. I show that his account has the surprising consequence that agents cannot attend to "negative access failures", cases in which someone fails to know something without knowing that they fail to know it. Whilst this prediction is prima facie unattractive, I show how it can be defended. Chapter 3 uses this Lewisian treatment of negative access failures to solve our problems for externalism. For I show that these problems arise not from maintaining that, in some situations, agents are unable to tell what they should believe, but rather from maintaining that rational agents can sometimes suspect that they are currently in such a situation or anticipate that they will be in such a situation in the future. Externalists can reject this stronger thesis. To explain how, I sketch a theory of evidence which integrates the Lewisian treatment of negative access failures to predict that agents always have to think that they can tell what they should believe, even though this isn't always true. By rejecting access, but maintaining that agents can never anticipate violating it, this theory reconciles the most attractive features of externalism and internalism.
by Bernhard Salow.
Ph. D. in Linguistics
APA, Harvard, Vancouver, ISO, and other styles
25

Steh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Drugge, Lundström Eric, and Kristoffer Agmalm. "Serverrum / SD-Access." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86325.

Full text
Abstract:
Vi fick i uppdrag av ATEA att sätta upp två stycken serverrum på Northvolt Ett i Skellefteå i samarbete med Nätverksteamet på Northvolt, samt installera distributionswitchar ute i fabriken som sedan ska användas för att koppla fabrikens maskiner till nätverket. Denna rapport handlar om Cisco DNA, SD-ACCESS och ISE som är tre moderniseringar av hur ett nätverk kan byggas upp. Rapporten kommer först att gå igenom teorin för att förstå vad som var målet för Cisco DNA, ISE och SD-ACCESS och varför det är bra att använda i ett modernt nätverk. Rapporten kommer gå igenom hur vi gick tillväga för att lära oss hur det fungerar, och vilket praktiskt arbete som utfördes för att fysiskt sätta upp två serverrum på Northvolt Ett.
APA, Harvard, Vancouver, ISO, and other styles
27

Steh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

de, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.

Full text
Abstract:
Professional Access Control (PAC) is a self-administrating access control model for professional users which employs a peer review process and oversight by system administrators. It is characterised by the existence of ethical controls on the relationships between the users (those accessing data or granting access privileges to others) and data owners. Investigations revealed that the issue of availability was crucial to users in the hospital domain studied, and that to minimise the administrative burden on system administrators, the users needed to take some of the load. These factors led to the development of the new Trusted Access Control (TAC) model which gives users control. TAC is a fundamental access control model, complementary to the well-known Mandatory Access Control (MAC) and Discretionary Access Control (DAC) models. PAC uses TAC at its core and also incorporates Role Based Access Control (RBAC) and Provision Based Access Control (PBAC). This gives it the flexibility and user-friendliness necessary in the hospital environment, while still providing a high degree of data confidentiality and integrity protection. The required PAC functionality has been built into an Oracle package which can be used by new and existing applications, making it a viable access control solution for complex environments such as hospitals. When enabled workflow applications use the Oracle package, access control is automatically effected behind-the-scene, providing both usability benefits and reduced administrative burden.
APA, Harvard, Vancouver, ISO, and other styles
29

Ho, Adrian K., and Charles W. Bailey. "Open Access Webliography." Emerald, 2005. http://hdl.handle.net/10150/105538.

Full text
Abstract:
This webliography presents a wide range of electronic resources related to the open access movement that are freely available on the Internet as of April 2005. It covers resources such as bibliographies, directories, guides, journals, mailing lists, organizations, projects, publishers and distributors, search engines, and Weblogs.
APA, Harvard, Vancouver, ISO, and other styles
30

Bailey, Charles W. "Open Access Bibliography." Association of Research Libraries, 2005. http://hdl.handle.net/10150/106437.

Full text
Abstract:
The Open Access Bibliography for liberating scholarly literature with E-Prints and Access Journals presents over 1,300 selected English-language books, conference papers (including some digital video presentations), debates, editorials, e-prints, journal and magazine articles, news articles, technical reports, and other printed and electronic sources. These are useful in understanding the open access movement's efforts to provide free access to and unfettered use of scholarly literature. Although most sources have been published between 1999 and August 31, 2004, a limited number of key sources published prior to 1999 are also included. This is a publication of the Association of Research Libraries (ARL) and the printed book can be ordered from ARL: http://www.arl.org/pubscat/pubs/openaccess/
APA, Harvard, Vancouver, ISO, and other styles
31

Weishaupt, Karin. "Open-Access-Zeitschriften." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2009. http://dx.doi.org/10.18452/15959.

Full text
Abstract:
Bei aller Aufmerksamkeit, die das Thema Open Access seit einigen Jahren erfährt, ist die praktische Nutzung längst noch nicht so weit gediehen, wie es von den technischen Voraussetzungen her möglich wäre: Nur 0,8 % aller Zeitschriften in Deutschland oder 2 % der wissenschaftlichen sind frei zugänglich. Es mangelt an Akzeptanz seitens der Autor/inn/n. Auf der Basis einer Befragung von ca. 1000 Personen, die bereits mindestens einen Aufsatz in einer Open-Access-Zeitschrift veröffentlicht haben, werden Maßnahmen entwickelt, wie die Akzeptanz verbessert werden kann. Bei der Analyse der Antworten erweisen sich die Unterschiede für mögliche Fördermaßnahmen zwischen den einzelnen Fachdisziplinen als längst nicht so ausgeprägt, wie es aufgrund des unterschiedlichen Standes von Open Access in den verschiedenen Fächern zu erwarten wäre. Von elementarer Bedeutung ist vielmehr die Frage, welche Ziele der/die einzelne beim Open-Access-Publizieren verfolgt; daraus ergeben sich Ansatzpunkte für fördernde Maßnahmen. Die größte Barriere für die Durchsetzung des Open-Access-Publizierens stellt das etablierte System der Forschungsevaluation dar, das sich fachübergreifend im Begutachtungsverfahren und in den Naturwissenschaften und der Medizin im Impact Factor manifestiert. Hieraus entstehen Akzeptanzhindernisse, die sachlich nicht gerechtfertigt sind und kritisch hinterfragt werden müssen. Mittelfristig ist der Ersatz des Impact Factors durch Verfahren anzustreben, die modernen Publikationsformen besser gerecht werden. Ein internationaler Vergleich zeigt, dass die Schwellenländer nicht nur durch Open Access unterstützt werden, sondern ihrerseits bemerkenswerte Aktivitäten und Erfolge vorzuweisen haben, die weltweit Vorbildcharakter haben und Anregungen für Maßnahmen zur Akzeptanzsteigerung in Deutschland bieten können. Bezüglich Open Access ist daher anstelle der Förderung der Dritten Welt eher ein Eine-Welt-Denken angebracht, bei dem alle Beteiligten voneinander lernen können
Although open access has been discussed intensively for some years, it is far away from being practised to a degree that would meet the actual technical standard. Only 0.8 % of all journals produced in Germany or 2 % of all German scientific journals are in open access. The problem to be overcome is the lack of acceptance by authors. As result of a survey among about 1000 persons who have already published at least one article in an open access journal, measures are suggested how acceptance can be improved. Considering the varying status open access has reached, differences between possible measures in the discliplines prove to be less distinctive as expected. The core question rather is which are the aims of the authors publishing in open access journals. Knowing their aims, measures to enhance acceptance can be derived. The highest barriere for open access is the established system of evaluating scientific research. Accross all disciplines the most important practise is peer reviewing of articles, in sciences and medicine the impact factor is of special importance. This is why the acceptance of open access journals without impact factor is low even if these journals may be characterized by high quality. Therefore the system of evaluation should be reviewed critically, and the impact factor might be substituted by other methods that take into account the specific qualities of modern forms of publications. An international comparison shows that open access does not only support the developing countries in their academic development. Rather, these countries offer considerable activities and achievements that can serve as models for the rest of the world and provide incitations for the improvement of the situation in Germany. This taken as a fact, we should not speak of less developed countries that need support, but rather of one world in which all countries are partners who can learn from each other.
APA, Harvard, Vancouver, ISO, and other styles
32

Robbin, Alice, and Martin David. "SIPP ACCESS: Information tools improve access to national longitudinal panel surveys." Reference and Adult Services Division (RASD) of the American Library Association, 1988. http://hdl.handle.net/10150/105545.

Full text
Abstract:
SIPP ACCESS represents an innovation in providing services for statistical data. A computer-based, integrated information system incorporates both the data and information about the data. SIPP ACCESS systematically links the technologies of laser disk, mainframe computer, microcomputer, and electronic networks and applies relational technology to create great efficiencies and lower the costs of storing, managing, retrieving, and transmitting data and information about complex statistical data collections. This information system has been applied to national longitudinal panel surveys. The article describes the reasons why SIPP ACCESS was created to improve access to these complex surveys and provides examples of tools that facilitate access to information about the contents of these large data sets.
APA, Harvard, Vancouver, ISO, and other styles
33

Bailey, Charles W. "The Spectrum of E-Journal Access Policies: Open to Restricted Access." DigitalKoans, 2005. http://hdl.handle.net/10150/105875.

Full text
Abstract:
As journal publishing continues to evolve, the access policies of publishers become more differentiated. The open access movement has been an important catalyst for change in this regard, prodding publishers to reexamine their access policies and, in some cases, to move towards new access models. To fully understand where things stand with journal access policies, we need to clarify and name the policies in use. This paper attempts to provide a first-cut model for key journal access policies, adopting the now popular use of colors as a second form of shorthand for identifying the policy types.
APA, Harvard, Vancouver, ISO, and other styles
34

Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.

Full text
Abstract:

Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patient’s treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patient’s medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employee’s work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.

APA, Harvard, Vancouver, ISO, and other styles
35

Espinazo, Pagán Javier. "Un repositorio de modelos para acceso escalable : A model repository for scalable access." Doctoral thesis, Universidad de Murcia, 2013. http://hdl.handle.net/10803/127305.

Full text
Abstract:
El trabajo presentado en esta tesis aborda los problemas de la persistencia y consulta de modelos en el ámbito de la Ingeniería del Software Dirigida por Modelos. La persistencia de modelos es el servicio que proporciona el almacenamiento de modelos residentes en memoria en medios persistentes tales como las bases de datos. La consulta de modelos es el proceso de buscar dentro de un modelo un conjunto de elementos que satisfagan una determinada condición. Los repositorios de modelos son una tecnología emergente para la persistencia de grandes modelos, surgida para superar las limitaciones de la persistencia basada en XMI, que proporcionan acceso remoto a éstos. En esta tesis presentamos Morsa, un repositorio de modelos enfocada a la escalabilidad e integración. Además de la persistencia de modelos, el repositorio Morsa ofrece el lenguaje de consultas MorsaQL, que ha sido diseñado con los objetivos de usabilidad, seguridad y eficiencia. Finalmente, para estudiar el estado del arte en las áreas de la persistencia y consulta de modelos y así poder desarrollar nuestras propias soluciones, hemos realizado un estudio y una comparativa de aproximaciones a ambas áreas. Objetivos El objetivo principal de esta tesis es la creación de un repositorio de modelos con especial énfasis en la escalabilidad para el manejo de grandes modelos y en la integración transparente. Este repositorio ofrece dos servicios básicos: (i) la persistencia de modelos, que permite manejar modelos grandes y (ii) la consulta de modelos, que permite a un cliente obtener elementos de un modelo almacenado en el repositorio. Otro objetivo de esta tesis es el estudio del arte en las áreas de la persistencia y consulta de modelos, realizando una comparativa de las soluciones existentes y definiendo un conjunto de dimensiones para caracterizar ambas áreas. Metodología El desarrollo de Morsa comenzó con un estudio del estado del arte para evaluar las soluciones de persistencia de modelos existentes y definir las dimensiones que caracterizan este área. Una vez completado este estudio, se procedió a elicitar los requisitos, entre los cuales cabe destacar la escalabilidad en el cliente y la integración transparente. Posteriormente se procedió al diseño, implementación y prueba de Morsa; para la evaluación del repositorio, se realizó una comparativa con CDO, el repositorio de modelos más utilizado en la actualidad, en la cual se demostrando la mayor eficiencia de Morsa. Una vez desarrollado Morsa, se procedió a la creación de MorsaQL, un lenguaje de consultas integrado en el repositorio. De nuevo, se realizó un estudio del estado del arte en el área de la consulta de modelos, a partir del cual se elicitaron los requisitos fundamentales de eficiencia, usabilidad y seguridad. Tras el diseño, implementación y prueba de MorsaQL, su evaluación se realizó comparándolo con las principales soluciones de consulta de modelos disponibles actualmente, resultando más eficiente y adecuado que el resto. Conclusiones El desarrollo de Morsa y MorsaQL, junto con el estudio del estado del arte realizado, nos ha proporcionado un conocimiento más profundo de la problemática asociada a la persistencia y consulta de modelos. Por otro lado, la evaluación de Morsa y MorsaQL y su comparación con las principales soluciones existentes aportan un importante valor añadido en forma de recomendaciones para la utilización de unas u otras soluciones en función del uso que se les vaya a dar. Finalmente, el conocimiento adquirido nos ha permitido definir unas líneas generales de investigación que sería beneficioso explorar de cara a conseguir una mayor alineación de las tecnologías de la Ingeniería del Software Dirigida por Modelos.
The work presented in this thesis tackles the problems of model persistence and querying in the field of Model-Driven Engineering. Model persistence is the service that provides the storage of in-memory models into persistent media such as data bases. Model querying is the processo of searching a model fro a set of elements that satisfy a given condition. To overcome the limitations of XMI-based persistence, model repositories are emerging as persistence solutions for large models, providing remote access to them. In this thesis, we present Morsa, a model repository focused on scalability and integration. Morever, Morsa provides the MorsaQL model querying language, which has been designed with the goals of usability, safeness and efficiency. Finally, in order to study the state of the art of the areas of model persistence and model querying and gain the knowledge we needed to develop our own solutions, we have studied and compare the different approaches to both areas. Goals The main goal of this thesis is the creation of a model repository for managing large models with a special emphasys on scalability and transparent integration. This repository offers two basic services: (i) model persistence, which provides means to handle large models, and (ii) model querying, which allows a client to obtain elements from a model that is stored in the repository. Another goal of this thesis is the study of the state of art of the areas of model persistence and model querying, comparing the existing solutions and defining a set of dimensions that can be used to characterize both areas. Methodology The development of Morsa began with a stage dedicated to the study of the state of the art of model persistence in order to evaluate the existing approaches and define the dimensions that characterize this area. Once this study was completed, the requirements were elicited, with special focus on client scalability and transparent integration. Afterwards, the design, implementation and test of Morsa were performed; for the evaluation of the repository, a comparison between it and CDO, the most widely used repository, was done, demonstrating the greater efficiency of Morsa. The creation of MorsaQL was tackled once the development of Morsa was finished. To do this, a study of the state of the art of model querying was performed, eliciting the main requirements of efficiency, usability and safeness. After the design, implementation and test of MorsaQL, its evaluation was performed by comparing it against the main model querying approaches currently available, resulting in MorsaQL being the most efficient and suitable. Conclusions The development of Morsa and MorsaQL, as well as the study of the state of the art, have given us a profound knowledge on the problematics of model persistence and querying. Moreover, the evaluation of Morsa and MorsaQL and their comparison against the main existing solutions provide an added value in the form of recommendations for which solutions to use depending on some given needs. Finally, the knowledge we have adquired has allowed us to define some research guidelines that would be beneficial to explore in order to achieve a greater alignment between the different Model Driven Engineering technologies.
APA, Harvard, Vancouver, ISO, and other styles
36

Cuillier, David. "Access attitudes : measuring and conceptualizing support for press access to government records." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Spring2006/d%5Fcuillier%5F041906.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.

Full text
Abstract:

The health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.

APA, Harvard, Vancouver, ISO, and other styles
38

Haider, Jutta. "Open access and closed discourses : constructing open access as a 'development' issue." Thesis, City University London, 2008. http://openaccess.city.ac.uk/8589/.

Full text
Abstract:
This thesis investigates the connection between open access - the free online availability and distribution of scientific and scholarly publications - and the 'developing world' from a post-development perspective. It takes a discourse analytical approach, drawing predominantly on Michel Foucault's understanding in discourse. It aims to answer the following questions: - Which notions of science, of development and progress, of knowledge as well as of information and technology are capitalised on in the open access debates and in which way are they shaped as a consequence? - Which discursive effects can be established, what are the results and of which kind are they? The thesis is divided into six chapters, chapters 2 to 5 are grouped into two parts. In the introduction (chapter 1) the general problem space is outlined, the connection between the open access movement and the 'developing world' is established; the research approach is briefly sketched, followed by a presentation of the research questions. Furthermore, the relevance of the study for Library and Information Science is discussed. Chapter 2 introduces the notion of discourse. It contains a discussion of the Foucauldian concept of discourse in relation to the notions of knowledge, truth, and power, as well as resistance, governmentality, and pastoral power. The manifestation of discourse in language is discussed with reference to Michel pecheux. The way in which discourses are dispersed unevenly in society is examined. It concludes with a presentation of the concept of the discursive procedure, which forms the basis for the analyses. Chapter 3 introduces post-development theory, specifically focusing on development discourse. It presents and problematises the concept of devt;lopment, of poverty and ignorance, as well as of science. The historical foundations of dev~lopmentdiscourse and the role of science and technology in it are examined. Chapter 4 investigates the representation of open access in its relation to development. It is based on a corpus consisting of 38 articles and similar publications and 5 statements and declarations. The latter are also examined from a genre perspective. The following discursive procedures are identified: (1) Leaving a blank or defining the undefinable: 111e elusiveness of the 'developing world', (2) Technologism and technological determinism, (3) Economism, (4) Scientific centralism and scientism, (5) Temporal distancing. It concludes with a discussion of the guiding metaphor, the divide. Chapter 5 investigates how open access is debated in the context of development. It draws on a two-week long email debate organised by a development institution in 2006. 146 postings by 49 participants are included in the analysis. The following discursive procedures are identified: (1) Technologism, (2) The role of the profession: mediation, translation, and control, (3) Rural people and the lack of education, (4) Developmentalism and antidev~ lopmentalism: Positioning oneself in and against development. It concludes with a discussion of the guiding metaphor, the barrier, as well as ofidentity construction. The concluding chapter 6 is concerned with providing a sum-up of the analyses with a view to answering the research questions. It considers a possible future for the open access movement in its relation to the 'developing world' and concludes with a brief discussion of issues relevant for future research. The main findings suggest that the 'developing world' is constructed around the coordinates provided by mainstream development thought. Open access is inserted into its discursive repertoire as a problem of development, a tool for its delivery, and its measure. The dominant understanding of information adheres to a sender/receiver model. However, ruptures occur in significant places. This requires a partial re-positioning of the way in which development is framed and of open access' role in it.
APA, Harvard, Vancouver, ISO, and other styles
39

Zhang, Xiushan. "L2 cache replacement based on inter-access time per access count prediction." Diss., Online access via UMI:, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hu, Wendong. "Medium access control protocols for cognitive radio based dynamics spectrum access networks." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1580792591&sid=28&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Willinsky, John. "The Access Principle: The Case for Open Access to Research and Scholarship." Cambridge, Mass.: MIT Press, 2006. http://hdl.handle.net/10150/106529.

Full text
Abstract:
This work is copyrighted by MIT Press and licensed under a Creative Commons Attribution-NonCommercial 2.5 License . MIT Press has granted permission to place a copy in dLIST. Readers can also purchase the book from MIT Press, which publishes it (see alternative location for details). Following abstract is from MIT Press: Questions about access to scholarship go back farther than recent debates over subscription prices, rights, and electronic archives suggest. The great libraries of the past -- from the fabled collection at Alexandria to the early public libraries of nineteenth-century America -- stood as arguments for increasing access. In The Access Principle, John Willinsky describes the latest chapter in this ongoing story -- online open access publishing by scholarly journals -- and makes a case for open access as a public good. A commitment to scholarly work, writes Willinsky, carries with it a responsibility to circulate that work as widely as possible: this is the access principle. In the digital age, that responsibility includes exploring new publishing technologies and economic models to improve access to scholarly work. Wide circulation adds value to published work; it is a significant aspect of its claim to be knowledge. The right to know and the right to be known are inextricably mixed. Open access, argues Willinsky, can benefit both a researcher-author working at the best-equipped lab at a leading research university and a teacher struggling to find resources in an impoverished high school. Willinsky describes different types of access -- the New England Journal of Medicine, for example, grants open access to issues six months after initial publication, and First Monday forgoes a print edition and makes its contents immediately accessible at no cost. He discusses the contradictions of copyright law, the reading of research, and the economic viability of open access. He also considers broader themes of public access to knowledge, human rights issues, lessons from publishing history, and "epistemological vanities." The debate over open access, writes Willinsky, raises crucial questions about the place of scholarly work in a larger world -- and about the future of knowledge. John Willinsky is Pacific Press Professor of Literacy and Technology at the University of British Columbia. He is the author of Empire of Words: The Reign of the OED and a developer of Open Journals Systems software.
APA, Harvard, Vancouver, ISO, and other styles
42

Wohlfarth, Dagmar, and Tobias Rothe. "1000 x Open access." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2007. http://nbn-resolving.de/urn:nbn:de:swb:14-1191935304231-19766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Schmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Charvandeh, Jenny. "Location aware web access." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91492.

Full text
Abstract:
The user's mobile communication device has an increasing sense of where the user is. This location information may be very fine grained or very coarse. Given some amount of location information it is possible to create location aware services. This thesis presents and evaluates a system for location aware web browsing. Indoors the user can click on a point on a map (to establish a virtual location using a previously installed user application), outdoors the location can be provided by GPS, or the location might be provided by some other location system (indoors or outdoors), then each HTTP GET request for a URL will be augmented with information about the user's location or their virtual location. Subsequently a web query is created. Then the location information encoded as longitude and latitude is appended to this web query. The web server uses this location information to generate dynamically location aware web pages. Finally a web browser shows the web pages.
Tillgång till information varsomhelst och vilken tid som helst är en viktig utkom av modern rörliga kommunikations systems. Alltmera har användarens terminal kännedom om användarens plats. Informationen om platsen kan vara lite eller omfattande. Tillgång till information om platsen gör det möjligt att skapa platsmedvetna tjänster. I den här master thesis presenterar och utvärderar jag ett system för plats medvetna web användning. Användaren klickar på en punkt på en karta (för att inrätta en virtuell lokalisering genom att använda tidigare installerat applikationer), sedan deras HTTP GET request för en URL utvidgas med information om användarens position eller deras virtuella (verkliga) lokalisering. En platsmedveten web query har skapats så att information om plats som latitude och longitude läggs till denna web query. Sedan en web server använder denna information för att generera dynamiska web sidor.
APA, Harvard, Vancouver, ISO, and other styles
45

Knight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Alkahtani, Saad Ahmed. "Children's access to medicines." Thesis, University of Nottingham, 2013. http://eprints.nottingham.ac.uk/13425/.

Full text
Abstract:
Access to health care for children is important. It is dependent on access to health professionals and also parental attitudes towards illness. Children have the right to receive medicines that are scientifically evaluated for both efficacy and safety. Counterfeit and substandard medicines unfortunately result in the death of many children worldwide. There have been particular problems with diethylene glycol which has been used as a solvent in counterfeit medicines. It has also been found in contaminated substandard medicines. It has been responsible for the death of many children in different countries throughout the world. I performed a literature review of all cases of diethylene glycol poisoning that have been published. I have described the clinical signs and symptoms and hope that these findings increase the awareness of diethylene glycol poisoning in children. It is well known that there are clear inequalities in health and access to health care in the UK. This inequity has been particularly noticed amongst certain minority groups. Children of “at risk” groups, such as Asylum Seekers and Refugees, and Gypsies and Travellers, were recognised as having possible barriers in accessing health care and medicines. I conducted a study to explore children’s access to medicines in the East Midlands area in the UK. Alongside determining accessibility to health care the study also wished to explore parental attitudes towards receiving treatment for pain, asthma and epilepsy Both quantitative and qualitative research methodology was used in this study. The research data was gathered with the aid of semi-structured interviews with parents from the “at risk” groups and control parents. Fifty parents from each group were selected and interviewed regarding their children‟s health and their access to health care and medicines. The semi-structured interviews allowed participating parents to state their opinions about any barriers they had encountered to their children receiving medicines. Parents from both “at risk” groups and children from the Traveller group had more health problems than the controls. The attitude of some Gypsy and Traveller parents (11%) not to immunise their children was a significant problem. One in six Refugee parents reported difficulties while obtaining medicines. The two main barriers were language/communication problems and financial difficulties. Both Refugee and Traveller children received fewer OTC medicines than the children of the control group. It was not clear from the interviews whether this was due to financial difficulties or reluctance to use medicines without a doctor having seen the child first. Parents from both “at risk” groups were less likely to give analgesics for treating earache than those in the control group. Parents of Refugee children were more reluctant to tell others about their child’s epilepsy. Access to health care is an essential human right. Children are dependent upon both their parents and the health system for ensuring access to health care. This study has identified problems both within the system and also in relation to parental beliefs that may affect the access to health care and treatment for children. It is important that both of these potential barriers are addressed in order to improve the health of children of “at risk” groups. It is hopeful that the findings in this study will help to identify ways of improving access to health care and medicines for these groups.
APA, Harvard, Vancouver, ISO, and other styles
47

Lang, Ulrich. "Access policies for middleware." Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.619792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.

Full text
Abstract:
Approved for public release; distribution is unlimited
As networks grow in complexity and data breaches become more costly, network administrators need better tools to help design networks that provide service-level availability while restricting unauthorized access. Current research, specifically in declarative network management, has sought to address this problem but fails to bridge the gap between service-level requirements and low-level configuration directives. We introduce service-oriented access control, an approach that frames the problem in terms of maintaining service-level paths between users and applications. We show its use in several scenarios involving tactical networks typically seen in the military’s field artillery community.
APA, Harvard, Vancouver, ISO, and other styles
49

Finean, Robert J. "Satellite access in FPLMTS." Thesis, University of Surrey, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lee, Stephen James S. M. Massachusetts Institute of Technology. "Adaptive electricity access planning." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/117878.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2018.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 139-149).
About 1.1 billion people worldwide lack access to electricity and an additional 1 billion have unreliable access. The social ramifications of this problem are noteworthy because access to electric power has the potential to transform societies. While admirable efforts are underway, there is general consensus that progress is falling far short of what is needed to reach international electricity access goals. In light of such deficiencies, it is arguable that systems-level experimentation and innovation is required if we are to achieve universal electricity access in the next one to two decades. With the advancement of technology, new opportunities are emerging that can potentially change the game. Machine learning methods and detailed technoeconomic models for planning comprise one set of technologies that hold significant promise for accelerating access. This thesis builds upon recent work towards the development of more intelligent decision support systems for electrification planning. Progress towards automated and scalable software systems for the extraction of building footprints from satellite imagery are presented. In addition, a novel model for probabilistic data fusion and other machine learning methods are compared for electrification status estimation. Inference tools such as these allow for the cost-effective provision of granular data required by techno-economic models. We also acknowledge that the technologies we detail should not be developed in a vacuum. Given that electrification is a complex endeavor involving numerous social and technical factors, careful consideration must be given to human, policy, and regulatory concerns during the planning process. We notice how uncertainty abounds in these activities and propose "adaptive electricity access planning" as a new model-assisted framework for the explicit consideration of uncertainty in large-scale planning. This work aspires to provide valuable perspective on the importance of uncertainty in planning as these endeavors continue to evolve.
by Stephen James Lee.
S.M. in Technology and Policy
S.M.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography