Academic literature on the topic 'Multi-access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Multi-access"
Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan, and Onur Mutlu. "Simultaneous Multi-Layer Access." ACM Transactions on Architecture and Code Optimization 12, no. 4 (January 7, 2016): 1–29. http://dx.doi.org/10.1145/2832911.
Full textAlderson, Priscilla, Mary Madden, Ann Oakley, and Ruth Wilkins. "Access and multi-centre research." Monash Bioethics Review 14, no. 4 (October 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.
Full textTatipally, Sampath Kumar, and Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.
Full textVaidya, Kanishak, and Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches." Entropy 25, no. 8 (August 18, 2023): 1228. http://dx.doi.org/10.3390/e25081228.
Full textGelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero, and Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks." Computer Networks 55, no. 1 (January 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.
Full textKolyeva, Natalya. "Organization of multi-access in databases." E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.
Full textTanaka, Hiroyuki, Masahiro Yoshida, Koya Mori, and Noriyuki Takahashi. "Multi-access Edge Computing: A Survey." Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.
Full textFilali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane, and Mohsen Guizani. "Multi-Access Edge Computing: A Survey." IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.
Full textNewmann, Scott. "Multi-vendor interoperability through SQL access." ACM SIGMOD Record 21, no. 2 (June 1992): 414. http://dx.doi.org/10.1145/141484.130345.
Full textDua, Aditya. "Random Access with Multi-Packet Reception." IEEE Transactions on Wireless Communications 7, no. 6 (June 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.
Full textDissertations / Theses on the topic "Multi-access"
Greaves, David J. "Multi-access metropolitan area networks." Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303053.
Full textShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Full textChoi, Byoung Jo. "Multi-carrier code division multiple access." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394098.
Full textStirling-Gallacher, Richard. "Multi-carrier code division multiple access." Thesis, University of Edinburgh, 1997. http://hdl.handle.net/1842/13027.
Full textAthamnah, Malek. "ENABLING MULTI-PARTY COLLABORATIVE DATA ACCESS." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/528695.
Full textPh.D.
Cloud computing has brought availability of services at unprecedented scales but data accessibility considerations become more complex due to involvement of multiple parties in providing the infrastructure. In this thesis, we discuss the problem of enabling cooperative data access in a multi-cloud environment where the data is owned and managed by multiple enterprises. We consider a multi-party collaboration scheme whereby a set of parties collectively decide accessibility to data from individual parties using different data models such as relational databases, and graph databases. In order to implement desired business services, parties need to share a selected portion of information with one another. We consider a model with a set of authorization rules over the joins of basic relations, and such rules are defined by these cooperating parties. The accessible information is constrained by these rules. Specifically, the following critical issues were examined: Combine rule enforcement and query planning and devise an algorithm which simultaneously checks for the enforceability of each rule and generation of minimum cost plan of its execution using a cost metric whenever the enforcement is possible; We also consider other forms of limiting the access to the shared data using safety properties and selection conditions. We proposed algorithms for both forms to remove any conflicts or violations between the limited accesses and model queries; Used graph databases with our authorization rules and query planning model to conduct similarity search between tuples, where we represent the relational database tuples as a graph with weighted edges, which enables queries involving "similarity" across the tuples. We proposed an algorithm to exploit the correlations between attributes to create virtual attributes that can be used to catch much of the data variance, and enhance the speed at which similarity search occurs; Proposed a framework for defining test functionalities their composition, and their access control. We discussed an algorithm to determine the realization of the given test via valid compositions of individual functionalities in a way to minimize the number of parties involved. The research significance resides in solving real-world issues that arise in using cloud services for enterprises After extensive evaluations, results revealed: collaborative data access model improves the security during cooperative data processes; systematic and efficient solving access rules conflict issues minimizes the possible data leakage; and, a systematic approach tackling control failure diagnosis helps reducing troubleshooting times and all that improve availability and resiliency. The study contributes to the knowledge, literature, and practice. This research opens up the space for further studies in various aspects of secure data cooperation in large-scale cyber and cyber-physical infrastructures.
Temple University--Theses
Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective." Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.
Full textGarnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.
Full textLarge data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, computational power spent on access control routines, procedures for administration and key distribution and availability of extension features needed in large scale data center scenarios. Our administration analysis will propose and present possible methods for initial key distribution to new machines in the data center, as well as methods for enrolling new users. We will also propose a method for automatic service instantiation in Kerberos and present a method for service instantiation in PKI. We will look at how the systems handle failed machines in the network, and look at how the systems handle breaches of trusted components. Our performance analysis will show that under given assumptions, both Kerberos and PKI will handle the average load in a hypothetical data center consisting of 100000 machines and 1000 users. We will also see that under an assumed peak load, Kerberos will be able to handle 10000 service requests in under 1 second, whereas the PKI solution would need at least 15 seconds to handle the same number of requests using recommended public key sizes. This means that some programs may need special configurations to work in a PKI system under high load.
羅福隆 and Fook-loong Lo. "Performance of multi-channel random access networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31236029.
Full textTelatar, Ä°brahim Emre. "Multi-access communications with decision feedback decoding." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13237.
Full textIncludes bibliographical references (leaves 84-85) and index.
by Ä°brahim Emre Telatar.
Ph.D.
Yang, Xu. "Multi-channel Mobile Access to Web Services." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30270.
Full textPh. D.
Books on the topic "Multi-access"
Center, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Find full textCenter, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Find full textCenter, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Find full textAnastasopoulos, Achilles. Cross model access in the multi-lingual, multi-model database management system. Monterey, Calif: Naval Postgraduate School, 1997.
Find full textGaffney, Kevin J. Techniques for multi-network access to multimedia messages. Dublin: University College Dublin, 1996.
Find full textSabella, Dario. Multi-access Edge Computing: Software Development at the Network Edge. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79618-1.
Full textMores, Robert. Fibre-optic, multi-access network for intracar and manufacturing environments. Leicester: De Montfort University, 1994.
Find full textMuntean, Gabriel-Miro, and Ramona Trestian. Wireless multi-access environments and quality of service provisioning: Solutions and application. Hershey PA: Information Science Reference, 2012.
Find full textBartalesi-Graf, Daniela, and Colleen Ryan. Caleidoscopio with MyItalianLab (multi Semester Access) -- Access Card Package. Pearson Education, Limited, 2014.
Find full textStelzer, Tim, and Paul A. Tipler. Tipler WebAssign Access Card & SmartPhysics Multi-Term Access Card. W. H. Freeman, 2012.
Find full textBook chapters on the topic "Multi-access"
Shekhar, Shashi, and Hui Xiong. "Multi-Dimensional Access Structures." In Encyclopedia of GIS, 758. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_841.
Full textConforto, Paolo, and Clementina Tocci. "Multi-Segment Access Network." In Space/Terrestrial Mobile Networks, 13–45. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470021039.ch2.
Full textPrasad, Ramjee, Muhammad Imadur Rahman, Suvra Sekhar Das, and Nicola Marchetti. "Multi-Carrier Based Access Techniques." In Single- And Multi-Carrier Mimo Transmission for Broadband Wireless Systems, 61–107. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339533-4.
Full textPark, Sun Rae, Jong Suk Ruth Lee, Kum Won Cho, and Kyu-Chul Lee. "Multi-level Access Control for GeoContents." In Communications in Computer and Information Science, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-26010-0_22.
Full textShibao, Kazunori, Aiichiro Higure, and Koji Yamaguchi. "Access Device 2: Multi-Channel Port." In Reduced Port Laparoscopic Surgery, 45–56. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_6.
Full textMorais, Douglas H. "Multi-carrier-Based Multiple-Access Techniques." In Key 5G Physical Layer Technologies, 129–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51441-9_7.
Full textShetty, Rajaneesh Sudhakar. "Multi-Access Edge Computing in 5G." In 5G Mobile Core Network, 69–102. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_2.
Full textMorais, Douglas H. "Multi-Carrier-Based Multiple-Access Techniques." In Key 5G Physical Layer Technologies, 143–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89209-8_7.
Full textAkman, Gizem, Philip Ginzboorg, and Valtteri Niemi. "Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications." In Computational Science and Its Applications – ICCSA 2021, 44–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87010-2_4.
Full textChen, Ying, Ning Zhang, Yuan Wu, and Sherman Shen. "Energy-Efficient Multi-Task Multi-Access Computation Offloading via NOMA." In Energy Efficient Computation Offloading in Mobile Edge Computing, 123–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16822-2_5.
Full textConference papers on the topic "Multi-access"
Koudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs, and H. Tang. "Access Flow based Multi-Radio Access Connectivity." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.
Full textSquicciarini, Anna Cinzia, Sarah Michele Rajtmajer, and Nicola Zannone. "Multi-Party Access Control." In SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205977.3205999.
Full textVetter, P. "Multi service access everywhere." In 31st European Conference on Optical Communications (ECOC 2005). IEE, 2005. http://dx.doi.org/10.1049/cp:20050833.
Full textJorguseski, Ljupco, Remco Litjens, Chen Zhiyi, and Homayon Nikookar. "Radio Access Selection in Multi-Radio Access Systems." In 2007 14th IEEE Symposium on Communications and Vehicular Technology in the Benelux. IEEE, 2007. http://dx.doi.org/10.1109/scvt.2007.4436230.
Full textRad, A. Hamed Mohsenian, and Vincent W. S. Wong. "Distributed Multi-Interface Multi-Channel Random Access." In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.1033.
Full textde Sousa, V. A., R. A. de O. Neto, F. de S. Chaves, L. S. Cardoso, and F. R. P. Cavalcanti. "Access selection with connection reallocation for multi-access networks." In ITS '07. 2007 International Telecommunications Symposium. IEEE, 2006. http://dx.doi.org/10.1109/its.2006.4433347.
Full textSachs, J., R. Aguero, M. Berg, J. Gebert, L. Jorguseski, I. Karla, P. Karlsson, et al. "Migration of Existing Access Networks Towards Multi-Radio Access." In IEEE Vehicular Technology Conference. IEEE, 2006. http://dx.doi.org/10.1109/vtcf.2006.616.
Full textWang, Lei, Haizhou Wang, Xue Jiang, Jingwu Cui, and Baoyu Zheng. "Multi-Access Edge Computing using Mode Division Multiple Access." In 2022 14th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2022. http://dx.doi.org/10.1109/wcsp55476.2022.10039371.
Full textYaish, Haitham, and Madhu Goyal. "Multi-tenant Database Access Control." In 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.131.
Full textNzomo, Peggy, Victoria L. Rubin, and Isola Ajiferuke. "Multi-lingual information access tools." In the 2012 iConference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2132176.2132276.
Full textReports on the topic "Multi-access"
Kanugovi, S., F. Baboescu, J. Zhu, and S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8743.
Full textZhu, J., and S. Kanugovi. Generic Multi-Access (GMA) Encapsulation Protocol. RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9188.
Full textMaggio, Gian M., David Laney, and Lawrence Larson. BER and Error-Floor Calculation for Multi-Access PCTH. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada414339.
Full textKondi, Lisimachos P. Scalable Video Transmission Over Multi-Rate Multiple Access Channels. Fort Belvoir, VA: Defense Technical Information Center, June 2007. http://dx.doi.org/10.21236/ada470529.
Full textLiu, Keqin, and Qing Zhao. Link Throughput of Multi-Channel Opportunistic Access with Limited Sensing. Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada575936.
Full textMelia, T., and S. Gundavelli, eds. Logical-Interface Support for IP Hosts with Multi-Access Support. RFC Editor, May 2016. http://dx.doi.org/10.17487/rfc7847.
Full textKazakos, D., and I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, February 1987. http://dx.doi.org/10.21236/ada186041.
Full textZeger, Linda, and Amanda Peters. Efficient Methods for Broadcasting Multi-Slot Messages with Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, April 2011. http://dx.doi.org/10.21236/ada570576.
Full textPeters, Amanda, and Linda Zeger. Efficient Resource Allocation for Broadcasting Multi-Slot Messages With Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, March 2011. http://dx.doi.org/10.21236/ada541058.
Full textOoghe, S., N. Voigt, M. Platnic, T. Haag, and S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5851.
Full text