Literatura académica sobre el tema "Multi-access"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Multi-access".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Multi-access"
Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan y Onur Mutlu. "Simultaneous Multi-Layer Access". ACM Transactions on Architecture and Code Optimization 12, n.º 4 (7 de enero de 2016): 1–29. http://dx.doi.org/10.1145/2832911.
Texto completoAlderson, Priscilla, Mary Madden, Ann Oakley y Ruth Wilkins. "Access and multi-centre research". Monash Bioethics Review 14, n.º 4 (octubre de 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.
Texto completoTatipally, Sampath Kumar y Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.
Texto completoVaidya, Kanishak y Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches". Entropy 25, n.º 8 (18 de agosto de 2023): 1228. http://dx.doi.org/10.3390/e25081228.
Texto completoGelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero y Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks". Computer Networks 55, n.º 1 (enero de 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.
Texto completoKolyeva, Natalya. "Organization of multi-access in databases". E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.
Texto completoTanaka, Hiroyuki, Masahiro Yoshida, Koya Mori y Noriyuki Takahashi. "Multi-access Edge Computing: A Survey". Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.
Texto completoFilali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane y Mohsen Guizani. "Multi-Access Edge Computing: A Survey". IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.
Texto completoNewmann, Scott. "Multi-vendor interoperability through SQL access". ACM SIGMOD Record 21, n.º 2 (junio de 1992): 414. http://dx.doi.org/10.1145/141484.130345.
Texto completoDua, Aditya. "Random Access with Multi-Packet Reception". IEEE Transactions on Wireless Communications 7, n.º 6 (junio de 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.
Texto completoTesis sobre el tema "Multi-access"
Greaves, David J. "Multi-access metropolitan area networks". Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303053.
Texto completoShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Texto completoChoi, Byoung Jo. "Multi-carrier code division multiple access". Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394098.
Texto completoStirling-Gallacher, Richard. "Multi-carrier code division multiple access". Thesis, University of Edinburgh, 1997. http://hdl.handle.net/1842/13027.
Texto completoAthamnah, Malek. "ENABLING MULTI-PARTY COLLABORATIVE DATA ACCESS". Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/528695.
Texto completoPh.D.
Cloud computing has brought availability of services at unprecedented scales but data accessibility considerations become more complex due to involvement of multiple parties in providing the infrastructure. In this thesis, we discuss the problem of enabling cooperative data access in a multi-cloud environment where the data is owned and managed by multiple enterprises. We consider a multi-party collaboration scheme whereby a set of parties collectively decide accessibility to data from individual parties using different data models such as relational databases, and graph databases. In order to implement desired business services, parties need to share a selected portion of information with one another. We consider a model with a set of authorization rules over the joins of basic relations, and such rules are defined by these cooperating parties. The accessible information is constrained by these rules. Specifically, the following critical issues were examined: Combine rule enforcement and query planning and devise an algorithm which simultaneously checks for the enforceability of each rule and generation of minimum cost plan of its execution using a cost metric whenever the enforcement is possible; We also consider other forms of limiting the access to the shared data using safety properties and selection conditions. We proposed algorithms for both forms to remove any conflicts or violations between the limited accesses and model queries; Used graph databases with our authorization rules and query planning model to conduct similarity search between tuples, where we represent the relational database tuples as a graph with weighted edges, which enables queries involving "similarity" across the tuples. We proposed an algorithm to exploit the correlations between attributes to create virtual attributes that can be used to catch much of the data variance, and enhance the speed at which similarity search occurs; Proposed a framework for defining test functionalities their composition, and their access control. We discussed an algorithm to determine the realization of the given test via valid compositions of individual functionalities in a way to minimize the number of parties involved. The research significance resides in solving real-world issues that arise in using cloud services for enterprises After extensive evaluations, results revealed: collaborative data access model improves the security during cooperative data processes; systematic and efficient solving access rules conflict issues minimizes the possible data leakage; and, a systematic approach tackling control failure diagnosis helps reducing troubleshooting times and all that improve availability and resiliency. The study contributes to the knowledge, literature, and practice. This research opens up the space for further studies in various aspects of secure data cooperation in large-scale cyber and cyber-physical infrastructures.
Temple University--Theses
Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective". Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.
Texto completoGarnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.
Texto completoLarge data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, computational power spent on access control routines, procedures for administration and key distribution and availability of extension features needed in large scale data center scenarios. Our administration analysis will propose and present possible methods for initial key distribution to new machines in the data center, as well as methods for enrolling new users. We will also propose a method for automatic service instantiation in Kerberos and present a method for service instantiation in PKI. We will look at how the systems handle failed machines in the network, and look at how the systems handle breaches of trusted components. Our performance analysis will show that under given assumptions, both Kerberos and PKI will handle the average load in a hypothetical data center consisting of 100000 machines and 1000 users. We will also see that under an assumed peak load, Kerberos will be able to handle 10000 service requests in under 1 second, whereas the PKI solution would need at least 15 seconds to handle the same number of requests using recommended public key sizes. This means that some programs may need special configurations to work in a PKI system under high load.
羅福隆 y Fook-loong Lo. "Performance of multi-channel random access networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31236029.
Texto completoTelatar, Ä°brahim Emre. "Multi-access communications with decision feedback decoding". Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13237.
Texto completoIncludes bibliographical references (leaves 84-85) and index.
by Ä°brahim Emre Telatar.
Ph.D.
Yang, Xu. "Multi-channel Mobile Access to Web Services". Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30270.
Texto completoPh. D.
Libros sobre el tema "Multi-access"
Center, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Buscar texto completoCenter, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Buscar texto completoCenter, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Buscar texto completoAnastasopoulos, Achilles. Cross model access in the multi-lingual, multi-model database management system. Monterey, Calif: Naval Postgraduate School, 1997.
Buscar texto completoGaffney, Kevin J. Techniques for multi-network access to multimedia messages. Dublin: University College Dublin, 1996.
Buscar texto completoSabella, Dario. Multi-access Edge Computing: Software Development at the Network Edge. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79618-1.
Texto completoMores, Robert. Fibre-optic, multi-access network for intracar and manufacturing environments. Leicester: De Montfort University, 1994.
Buscar texto completoMuntean, Gabriel-Miro y Ramona Trestian. Wireless multi-access environments and quality of service provisioning: Solutions and application. Hershey PA: Information Science Reference, 2012.
Buscar texto completoBartalesi-Graf, Daniela y Colleen Ryan. Caleidoscopio with MyItalianLab (multi Semester Access) -- Access Card Package. Pearson Education, Limited, 2014.
Buscar texto completoStelzer, Tim y Paul A. Tipler. Tipler WebAssign Access Card & SmartPhysics Multi-Term Access Card. W. H. Freeman, 2012.
Buscar texto completoCapítulos de libros sobre el tema "Multi-access"
Shekhar, Shashi y Hui Xiong. "Multi-Dimensional Access Structures". En Encyclopedia of GIS, 758. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_841.
Texto completoConforto, Paolo y Clementina Tocci. "Multi-Segment Access Network". En Space/Terrestrial Mobile Networks, 13–45. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470021039.ch2.
Texto completoPrasad, Ramjee, Muhammad Imadur Rahman, Suvra Sekhar Das y Nicola Marchetti. "Multi-Carrier Based Access Techniques". En Single- And Multi-Carrier Mimo Transmission for Broadband Wireless Systems, 61–107. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339533-4.
Texto completoPark, Sun Rae, Jong Suk Ruth Lee, Kum Won Cho y Kyu-Chul Lee. "Multi-level Access Control for GeoContents". En Communications in Computer and Information Science, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-26010-0_22.
Texto completoShibao, Kazunori, Aiichiro Higure y Koji Yamaguchi. "Access Device 2: Multi-Channel Port". En Reduced Port Laparoscopic Surgery, 45–56. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_6.
Texto completoMorais, Douglas H. "Multi-carrier-Based Multiple-Access Techniques". En Key 5G Physical Layer Technologies, 129–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51441-9_7.
Texto completoShetty, Rajaneesh Sudhakar. "Multi-Access Edge Computing in 5G". En 5G Mobile Core Network, 69–102. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_2.
Texto completoMorais, Douglas H. "Multi-Carrier-Based Multiple-Access Techniques". En Key 5G Physical Layer Technologies, 143–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89209-8_7.
Texto completoAkman, Gizem, Philip Ginzboorg y Valtteri Niemi. "Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications". En Computational Science and Its Applications – ICCSA 2021, 44–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87010-2_4.
Texto completoChen, Ying, Ning Zhang, Yuan Wu y Sherman Shen. "Energy-Efficient Multi-Task Multi-Access Computation Offloading via NOMA". En Energy Efficient Computation Offloading in Mobile Edge Computing, 123–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16822-2_5.
Texto completoActas de conferencias sobre el tema "Multi-access"
Koudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs y H. Tang. "Access Flow based Multi-Radio Access Connectivity". En 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.
Texto completoSquicciarini, Anna Cinzia, Sarah Michele Rajtmajer y Nicola Zannone. "Multi-Party Access Control". En SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205977.3205999.
Texto completoVetter, P. "Multi service access everywhere". En 31st European Conference on Optical Communications (ECOC 2005). IEE, 2005. http://dx.doi.org/10.1049/cp:20050833.
Texto completoJorguseski, Ljupco, Remco Litjens, Chen Zhiyi y Homayon Nikookar. "Radio Access Selection in Multi-Radio Access Systems". En 2007 14th IEEE Symposium on Communications and Vehicular Technology in the Benelux. IEEE, 2007. http://dx.doi.org/10.1109/scvt.2007.4436230.
Texto completoRad, A. Hamed Mohsenian y Vincent W. S. Wong. "Distributed Multi-Interface Multi-Channel Random Access". En IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.1033.
Texto completode Sousa, V. A., R. A. de O. Neto, F. de S. Chaves, L. S. Cardoso y F. R. P. Cavalcanti. "Access selection with connection reallocation for multi-access networks". En ITS '07. 2007 International Telecommunications Symposium. IEEE, 2006. http://dx.doi.org/10.1109/its.2006.4433347.
Texto completoSachs, J., R. Aguero, M. Berg, J. Gebert, L. Jorguseski, I. Karla, P. Karlsson et al. "Migration of Existing Access Networks Towards Multi-Radio Access". En IEEE Vehicular Technology Conference. IEEE, 2006. http://dx.doi.org/10.1109/vtcf.2006.616.
Texto completoWang, Lei, Haizhou Wang, Xue Jiang, Jingwu Cui y Baoyu Zheng. "Multi-Access Edge Computing using Mode Division Multiple Access". En 2022 14th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2022. http://dx.doi.org/10.1109/wcsp55476.2022.10039371.
Texto completoYaish, Haitham y Madhu Goyal. "Multi-tenant Database Access Control". En 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.131.
Texto completoNzomo, Peggy, Victoria L. Rubin y Isola Ajiferuke. "Multi-lingual information access tools". En the 2012 iConference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2132176.2132276.
Texto completoInformes sobre el tema "Multi-access"
Kanugovi, S., F. Baboescu, J. Zhu y S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, marzo de 2020. http://dx.doi.org/10.17487/rfc8743.
Texto completoZhu, J. y S. Kanugovi. Generic Multi-Access (GMA) Encapsulation Protocol. RFC Editor, febrero de 2022. http://dx.doi.org/10.17487/rfc9188.
Texto completoMaggio, Gian M., David Laney y Lawrence Larson. BER and Error-Floor Calculation for Multi-Access PCTH. Fort Belvoir, VA: Defense Technical Information Center, enero de 2002. http://dx.doi.org/10.21236/ada414339.
Texto completoKondi, Lisimachos P. Scalable Video Transmission Over Multi-Rate Multiple Access Channels. Fort Belvoir, VA: Defense Technical Information Center, junio de 2007. http://dx.doi.org/10.21236/ada470529.
Texto completoLiu, Keqin y Qing Zhao. Link Throughput of Multi-Channel Opportunistic Access with Limited Sensing. Fort Belvoir, VA: Defense Technical Information Center, julio de 2007. http://dx.doi.org/10.21236/ada575936.
Texto completoMelia, T. y S. Gundavelli, eds. Logical-Interface Support for IP Hosts with Multi-Access Support. RFC Editor, mayo de 2016. http://dx.doi.org/10.17487/rfc7847.
Texto completoKazakos, D. y I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, febrero de 1987. http://dx.doi.org/10.21236/ada186041.
Texto completoZeger, Linda y Amanda Peters. Efficient Methods for Broadcasting Multi-Slot Messages with Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, abril de 2011. http://dx.doi.org/10.21236/ada570576.
Texto completoPeters, Amanda y Linda Zeger. Efficient Resource Allocation for Broadcasting Multi-Slot Messages With Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, marzo de 2011. http://dx.doi.org/10.21236/ada541058.
Texto completoOoghe, S., N. Voigt, M. Platnic, T. Haag y S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, mayo de 2010. http://dx.doi.org/10.17487/rfc5851.
Texto completo