Journal articles on the topic 'Multi-access'

To see the other types of publications on this topic, follow the link: Multi-access.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan, and Onur Mutlu. "Simultaneous Multi-Layer Access." ACM Transactions on Architecture and Code Optimization 12, no. 4 (January 7, 2016): 1–29. http://dx.doi.org/10.1145/2832911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alderson, Priscilla, Mary Madden, Ann Oakley, and Ruth Wilkins. "Access and multi-centre research." Monash Bioethics Review 14, no. 4 (October 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tatipally, Sampath Kumar, and Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vaidya, Kanishak, and Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches." Entropy 25, no. 8 (August 18, 2023): 1228. http://dx.doi.org/10.3390/e25081228.

Full text
Abstract:
We consider the problem of multi-access cache-aided multi-user Private Information Retrieval (MACAMuPIR) with cyclic wraparound cache access. In MACAMuPIR, several files are replicated across multiple servers. There are multiple users and multiple cache nodes. When the network is not congested, servers fill these cache nodes with the content of the files. During peak network traffic, each user accesses several cache nodes. Every user wants to retrieve one file from the servers but does not want the servers to know their demands. This paper proposes a private retrieval scheme for MACAMuPIR and characterizes the transmission cost for multi-access systems with cyclic wraparound cache access. We formalize privacy and correctness constraints and analyze transmission costs. The scheme outperforms the previously known dedicated cache setup, offering efficient and private retrieval. Results demonstrate the effectiveness of the multi-access approach. Our research contributes an efficient, privacy-preserving solution for multi-user PIR, advancing secure data retrieval from distributed servers.
APA, Harvard, Vancouver, ISO, and other styles
5

Gelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero, and Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks." Computer Networks 55, no. 1 (January 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kolyeva, Natalya. "Organization of multi-access in databases." E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.

Full text
Abstract:
A particular, but important problem of freeing database memory in multi-access conditions is considered. A number of solutions to this problem are proposed and their advantages and disadvantages are noted. Three methods of organizing work with free space are considered. The first method assumes two additional modes of capturing pages: “Joint deletion” and “deletion”. In the second method, the pages after the last tuple have been deleted are inserted at the end of the free list. The third method involves the actual presentation of the freed pages of the relationship to the free memory pool of the segment and is postponed until the relationship is reorganized.
APA, Harvard, Vancouver, ISO, and other styles
7

Tanaka, Hiroyuki, Masahiro Yoshida, Koya Mori, and Noriyuki Takahashi. "Multi-access Edge Computing: A Survey." Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Filali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane, and Mohsen Guizani. "Multi-Access Edge Computing: A Survey." IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Newmann, Scott. "Multi-vendor interoperability through SQL access." ACM SIGMOD Record 21, no. 2 (June 1992): 414. http://dx.doi.org/10.1145/141484.130345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dua, Aditya. "Random Access with Multi-Packet Reception." IEEE Transactions on Wireless Communications 7, no. 6 (June 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sachs, Joachim, Mikael Prytz, and Jens Gebert. "Multi-access Management in Heterogeneous Networks." Wireless Personal Communications 48, no. 1 (November 24, 2007): 7–32. http://dx.doi.org/10.1007/s11277-007-9431-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Altuntaş, Süleyman, and Buyurman Baykal. "Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks." Computer Networks 47, no. 4 (March 2005): 577–92. http://dx.doi.org/10.1016/j.comnet.2004.03.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Davidson, I. J. A. "Access Centrale?: Access Clinic. Access Decisions and the Multi-Disciplinary Care Our Patients Deserve." Journal of Vascular Access 7, no. 4 (October 2006): 235–38. http://dx.doi.org/10.1177/112972980600700461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sachs, Joachim, and Per Magnusson. "Assessment of the access selection gain in multi-radio access networks." European Transactions on Telecommunications 20, no. 3 (April 2009): 265–79. http://dx.doi.org/10.1002/ett.1254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Albonda, Haider D., and Sufian Yousef. "Multi-carrier coded division multiple access multiplexing against multi-path fading." International Journal of Electronic Security and Digital Forensics 6, no. 2 (2014): 140. http://dx.doi.org/10.1504/ijesdf.2014.063111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

AbdulKadhim, Noor, and Mouiad Al-Wahah. "Semantic-Based Multi-Domain Data Access Authorization." Journal of Physics: Conference Series 1818, no. 1 (March 1, 2021): 012211. http://dx.doi.org/10.1088/1742-6596/1818/1/012211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Hai-Wu. "Design of Multi-Functional Access Control System." IEEE Access 9 (2021): 85255–64. http://dx.doi.org/10.1109/access.2021.3087917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mishra, Shailendra, and D. S. Chauhan. "Resource Allocation for Multi Access MIMO Systems." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 36–50. http://dx.doi.org/10.4018/jmcmc.2011070103.

Full text
Abstract:
In this paper, the authors discuss the emergence of new technologies related to the topic of the high-speed packet data access in wireless networks. The authors propose an algorithm for MIMO systems that optimizes the number of the transmit antennas according to the user’s QoS. Scheduling performance under two types of traffic modes is also discussed: one is voice or web-browsing and the other is for data transfer and streaming data.
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Fangzhou, Li Chen, Nan Zhao, Yunfei Chen, F. Richard Yu, and Guo Wei. "NOMA-Enhanced Computation Over Multi-Access Channels." IEEE Transactions on Wireless Communications 19, no. 4 (April 2020): 2252–67. http://dx.doi.org/10.1109/twc.2019.2963654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sarakis, Lambros, George Kormentzas, and Francisco Moya Guirao. "Seamless service provision for multi heterogeneous access." IEEE Wireless Communications 16, no. 5 (October 2009): 32–40. http://dx.doi.org/10.1109/mwc.2009.5300300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kolsi, Nader, Abdelaziz Abdellatif, and Khaled Ghedira. "Data warehouse access using multi-agent system." Distributed and Parallel Databases 25, no. 1-2 (February 21, 2009): 29–45. http://dx.doi.org/10.1007/s10619-009-7036-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Robson, J. M. "Random access machines with multi-dimensional memories." Information Processing Letters 34, no. 5 (May 1990): 265–66. http://dx.doi.org/10.1016/0020-0190(90)90133-i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Steinkoenig, Jan, Resat Aksakal, and Filip Du Prez. "Molecular access to multi-dimensionally encoded information." European Polymer Journal 120 (November 2019): 109260. http://dx.doi.org/10.1016/j.eurpolymj.2019.109260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Berendt, Annelise. "The changing landscape for multi access portals." Business Information Review 19, no. 2 (June 2002): 21–29. http://dx.doi.org/10.1177/026638202321036204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Tan, Mizhou, Pingping Zong, and Yeheskel Bar-Ness. "Multi-Rate Access Schemes for MC-CDMA." Wireless Personal Communications 27, no. 2 (November 2003): 149–82. http://dx.doi.org/10.1023/b:wire.0000003835.59701.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Abrantes, Filipe, and Manuel Ricardo. "XCP for shared-access multi-rate media." ACM SIGCOMM Computer Communication Review 36, no. 3 (July 5, 2006): 27–38. http://dx.doi.org/10.1145/1140086.1140091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Antony Franklin, A., and Supriya Dilip Tambe. "Multi-access edge computing in cellular networks." CSI Transactions on ICT 8, no. 1 (March 2020): 85–92. http://dx.doi.org/10.1007/s40012-020-00276-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Malamas, Vangelis, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester, and Dimitris Glynos. "Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments." Applied Sciences 13, no. 1 (December 31, 2022): 566. http://dx.doi.org/10.3390/app13010566.

Full text
Abstract:
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open challenge. We present HMBAC, a distributed fine-grained access control model for shared and dynamic multi-authority and multi-domain environments, along with Janus, a practical system for HMBAC policy enforcement. The proposed HMBAC model supports: (a) dynamic trust management between different authorities; (b) flexible access control policy enforcement, defined at the domain and cross-domain level; (c) a global source of truth for all entities, supported by an immutable, audit-friendly mechanism. Janus implements the HMBAC model and relies on the effective fusion of two core components. First, a Hierarchical Multi-Blockchain architecture that acts as a single access point that cannot be bypassed by users or authorities. Second, a Multi-Authority Attribute-Based Encryption protocol that supports flexible shared multi-owner encryption, where attribute keys from different authorities are combined to decrypt data distributedly stored in different authorities. Our approach was implemented using Hyperledger Fabric as the underlying blockchain, with the system components placed in Kubernetes Docker container pods. We experimentally validated the effectiveness and efficiency of Janus, while fully reproducible artifacts of both our implementation and our measurements are provided.
APA, Harvard, Vancouver, ISO, and other styles
29

Hosono, Kohei, Akihiko Maki, Yousuke Watanabe, Hiroaki Takada, and Kenya Sato. "Efficient Access Method for Multi-access Edge Servers in Dynamic Map Systems." International Journal of Intelligent Transportation Systems Research 20, no. 1 (January 24, 2022): 252–65. http://dx.doi.org/10.1007/s13177-021-00289-8.

Full text
Abstract:
AbstractResearch and development on connected cars equipped with communication functions is being conducted, and dynamic maps are being researched and developed as an information and communication platform for cooperative automatic driving. There is a concern about scalability when dynamic maps are constructed on a cloud server to aggregate a wide range of vehicle information. The problem can be alleviated by deploying edge servers that divide the geographic area where vehicles travel and manage each of them. The IP addresses of the edge servers need to be resolved on the basis of the location information of the moving vehicles. Using TCP improves reliability but reduces efficiency because the vehicles move. In this study, we developed a novel method for accessing edge servers that achieves higher reliability and efficiency by adopting UDP using anycast for transmission from vehicle to edge server and implementing a retransmission function. The effectiveness of this access method was verified by using a vehicle driving simulation.
APA, Harvard, Vancouver, ISO, and other styles
30

Mennes, Ruben, Felipe A. P. De Figueiredo, and Steven Latre. "Multi-Agent Deep Learning for Multi-Channel Access in Slotted Wireless Networks." IEEE Access 8 (2020): 95032–45. http://dx.doi.org/10.1109/access.2020.2995456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Aghamir, Seyed Mohammad Kazem, Reza Heidari, Seyedehsara Bayesh, Alborz Salavati, and Reza Elmimehr. "Are Nephrostomy and Ureteral Stent Necessary after Multi-Access Percutaneous Nephrolithotomy?" Current Urology 13, no. 3 (2019): 141–44. http://dx.doi.org/10.1159/000499279.

Full text
Abstract:
Introduction: Totally tubeless percutaneous nephrolithotomy (PCNL) is a well-established technique used in single -access procedure nevertheless these results challenge the multi-access PCNL as a contra-indication to application of this technique. Aims: To compare complication rates and safety of use of this technique after multi-access PCNL. Methods: A Total of 130 patients with renal stones were enrolled in this cohort study. Totally tubeless PCNL with single access (Group A, n = 70) and multi-access (Group B, n = 60) were done and bleedings were assessed by measuring hemoglobin (Hb) drop, blood transfusion rate and need for angioembolization besides leakage rates which were also recorded. Results: In the 130 patients who underwent totally tubeless PCNL, no leakage from puncture site nor angioembolization cases were identified. There was no significant statistical differences between 2 groups regarding Hb drop (1.91 in single access versus 2.20 in multi-access), transfusion rate and length of hospital stay (p > 0.05). Stone-free rate was increased from 91% in single access to 97% in multi access by adding percutaneous access sites (from 91% in single access to 97% in multi-access). Conclusions: Multi-access totally tubeless PCNL seems feasible and has comparable complication rates including Hb drop besides providing the advantage of higher stone-free rates using multi-access tracts.
APA, Harvard, Vancouver, ISO, and other styles
32

DONG Xiao-qing, 董晓庆, 程良伦 CHENG Liang-lun, 陈洪财 CHEN Hong-cai, 郑耿忠 ZHENG Geng-zhong, and 谢森林 XIE Sen-lin. "Multi-objective optimization control method for multi-user multi-service access in heterogeneous wireless networks." Chinese Journal of Liquid Crystals and Displays 34, no. 7 (2019): 708–15. http://dx.doi.org/10.3788/yjyxs20193407.0708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kapadia, Percy, and Boon-Chong Seet. "Multi-Tier Cellular Handover with Multi-Access Edge Computing and Deep Learning." Telecom 2, no. 4 (November 15, 2021): 446–71. http://dx.doi.org/10.3390/telecom2040026.

Full text
Abstract:
This paper proposes a potential enhancement of handover for the next-generation multi-tier cellular network, utilizing two fifth-generation (5G) enabling technologies: multi-access edge computing (MEC) and machine learning (ML). MEC and ML techniques are the primary enablers for enhanced mobile broadband (eMBB) and ultra-reliable and low latency communication (URLLC). The subset of ML chosen for this research is deep learning (DL), as it is adept at learning long-term dependencies. A variant of artificial neural networks called a long short-term memory (LSTM) network is used in conjunction with a look-up table (LUT) as part of the proposed solution. Subsequently, edge computing virtualization methods are utilized to reduce handover latency and increase the overall throughput of the network. A realistic simulation of the proposed solution in a multi-tier 5G radio access network (RAN) showed a 40–60% improvement in overall throughput. Although the proposed scheme may increase the number of handovers, it is effective in reducing the handover failure (HOF) and ping-pong rates by 30% and 86%, respectively, compared to the current 3GPP scheme.
APA, Harvard, Vancouver, ISO, and other styles
34

Apostolopoulos, Pavlos Athanasios, Eirini Eleni Tsiropoulou, and Symeon Papavassiliou. "Risk-Aware Data Offloading in Multi-Server Multi-Access Edge Computing Environment." IEEE/ACM Transactions on Networking 28, no. 3 (June 2020): 1405–18. http://dx.doi.org/10.1109/tnet.2020.2983119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Inaba, Yuma, and Eiji okamoto. "Multi-user chaos MIMO-OFDM scheme for physical layer multi-access security." Nonlinear Theory and Its Applications, IEICE 5, no. 2 (2014): 172–83. http://dx.doi.org/10.1587/nolta.5.172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Katsis, Petros, George Karagiannidis, and Fotini-niovi Pavlidou. "Multi-user selection diversity for spread-spectrum multi-carrier multiple-access systems." IEEE Transactions on Communications 56, no. 12 (December 2008): 2166–77. http://dx.doi.org/10.1109/tcomm.2008.050307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zheng, Jianchao, Honggang Zhang, Yueming Cai, Rongpeng Li, and Alagan Anpalagan. "Game-Theoretic Multi-Channel Multi-Access in Energy Harvesting Wireless Sensor Networks." IEEE Sensors Journal 16, no. 11 (June 2016): 4587–94. http://dx.doi.org/10.1109/jsen.2016.2539346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zhou, Yuchen, Jian Chen, and Yonghong Kuo. "Fairness Resource Allocation for Parallel Multi-Radio Access in Cognitive Multi-Cell." Wireless Personal Communications 88, no. 3 (January 21, 2016): 587–602. http://dx.doi.org/10.1007/s11277-016-3180-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Maiya, Megha, and Bechir Hamdaoui. "iMAC: improved Medium Access Control for multi-channel multi-hop wireless networks." Wireless Communications and Mobile Computing 13, no. 11 (July 19, 2011): 1060–71. http://dx.doi.org/10.1002/wcm.1160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Gill, Simardeep, Robert Quinn, Matthew Oliver, Fareed Kamar, Rameez Kabani, Daniel Devoe, Priyanka Mysore, et al. "Multi-Disciplinary Vascular Access Care and Access Outcomes in People Starting Hemodialysis Therapy." Clinical Journal of the American Society of Nephrology 12, no. 12 (September 14, 2017): 1991–99. http://dx.doi.org/10.2215/cjn.03430317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Dou, Feng Wang, Bing-hui Ji, and Hai-ge Xiang. "The Predictive Multi-Access access Channel Allocation Scheme in Broadband Satellite Mesh Network." Journal of Electronics & Information Technology 30, no. 4 (March 11, 2011): 763–67. http://dx.doi.org/10.3724/sp.j.1146.2006.01604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Jing, Guochu Shou, Yaqiong Liu, Yihong Hu, and Zhigang Guo. "Performance Evaluation of Integrated Multi-Access Edge Computing and Fiber-Wireless Access Networks." IEEE Access 6 (2018): 30269–79. http://dx.doi.org/10.1109/access.2018.2833619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sachs, Joachim, and Magnus Olsson. "Access network discovery and selection in the evolved 3GPP multi-access system architecture." European Transactions on Telecommunications 21, no. 6 (April 25, 2010): 544–57. http://dx.doi.org/10.1002/ett.1410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Bande, Meghana, Akshayaa Magesh, and Venugopal V. Veeravalli. "Dynamic Spectrum Access Using Stochastic Multi-User Bandits." IEEE Wireless Communications Letters 10, no. 5 (May 2021): 953–56. http://dx.doi.org/10.1109/lwc.2021.3051328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Yu, Ye, Xiangyuan Bu, Kai Yang, Hongyuan Yang, Xiaozheng Gao, and Zhu Han. "UAV-Aided Low Latency Multi-Access Edge Computing." IEEE Transactions on Vehicular Technology 70, no. 5 (May 2021): 4955–67. http://dx.doi.org/10.1109/tvt.2021.3072065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Pencheva, Evelina N., Ivaylo I. Atanasov, and Vladislav G. Vladislavov. "Mission Critical Messaging Using Multi-Access Edge Computing." Cybernetics and Information Technologies 19, no. 4 (November 1, 2019): 73–89. http://dx.doi.org/10.2478/cait-2019-0037.

Full text
Abstract:
Abstract 5th Generation (5G) mobile system is expected to support the requirements of mission critical communications for ultra reliability and availability, and very low latency. With the development of messaging and data transfer in mobile networks, mission critical communication users see more and more potential in data communications. In this paper, we explore the capabilities of Multi-access Edge Computing (MEC) that appears to be a key 5G component, to provide short messaging service at the network edge. The provided use cases illustrate the capabilities for transferring mobile originating and mobile terminating short messages to and from mission critical mobile edge applications. The data model describes the service resource structure and the Application Programming Interface definitions illustrate how the mobile edge applications can use the service. Some implementation aspects related to behavioral logic of the network and applications are provided. The performance analysis enables estimation of latency introduced by the service.
APA, Harvard, Vancouver, ISO, and other styles
47

Borodin, V. V., A. M. Petrakov, V. A. Shevtsov, and T. Ya Shevgunov. "Multi-Station Access without Acknowledgement in IoT Networks." Russian Aeronautics 62, no. 3 (July 2019): 522–26. http://dx.doi.org/10.3103/s1068799819030243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Pore, D., P. Hegade, D. Gaikwad, P. Patil, and J. Patil. "Green Access to Multi-Component Synthesis of Spiropyranopyrazoles." Letters in Organic Chemistry 11, no. 2 (January 31, 2014): 131–35. http://dx.doi.org/10.2174/15701786113106660069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

BEN AYED, Souheil, and Fumio TERAOKA. "Collaborative Access Control for Multi-Domain Cloud Computing." IEICE Transactions on Information and Systems E95.D, no. 10 (2012): 2401–14. http://dx.doi.org/10.1587/transinf.e95.d.2401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

R, Aishwarya Lakshmi, and Sashi Kumar D R. "Two Factor Data Access Control – Multi Authority Control." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 6 (June 30, 2017): 537–67. http://dx.doi.org/10.23956/ijarcsse/v7i6/0306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography