Artículos de revistas sobre el tema "Multi-access"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Multi-access.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Multi-access".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan y Onur Mutlu. "Simultaneous Multi-Layer Access". ACM Transactions on Architecture and Code Optimization 12, n.º 4 (7 de enero de 2016): 1–29. http://dx.doi.org/10.1145/2832911.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Alderson, Priscilla, Mary Madden, Ann Oakley y Ruth Wilkins. "Access and multi-centre research". Monash Bioethics Review 14, n.º 4 (octubre de 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Tatipally, Sampath Kumar y Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Vaidya, Kanishak y Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches". Entropy 25, n.º 8 (18 de agosto de 2023): 1228. http://dx.doi.org/10.3390/e25081228.

Texto completo
Resumen
We consider the problem of multi-access cache-aided multi-user Private Information Retrieval (MACAMuPIR) with cyclic wraparound cache access. In MACAMuPIR, several files are replicated across multiple servers. There are multiple users and multiple cache nodes. When the network is not congested, servers fill these cache nodes with the content of the files. During peak network traffic, each user accesses several cache nodes. Every user wants to retrieve one file from the servers but does not want the servers to know their demands. This paper proposes a private retrieval scheme for MACAMuPIR and characterizes the transmission cost for multi-access systems with cyclic wraparound cache access. We formalize privacy and correctness constraints and analyze transmission costs. The scheme outperforms the previously known dedicated cache setup, offering efficient and private retrieval. Results demonstrate the effectiveness of the multi-access approach. Our research contributes an efficient, privacy-preserving solution for multi-user PIR, advancing secure data retrieval from distributed servers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Gelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero y Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks". Computer Networks 55, n.º 1 (enero de 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Kolyeva, Natalya. "Organization of multi-access in databases". E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.

Texto completo
Resumen
A particular, but important problem of freeing database memory in multi-access conditions is considered. A number of solutions to this problem are proposed and their advantages and disadvantages are noted. Three methods of organizing work with free space are considered. The first method assumes two additional modes of capturing pages: “Joint deletion” and “deletion”. In the second method, the pages after the last tuple have been deleted are inserted at the end of the free list. The third method involves the actual presentation of the freed pages of the relationship to the free memory pool of the segment and is postponed until the relationship is reorganized.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Tanaka, Hiroyuki, Masahiro Yoshida, Koya Mori y Noriyuki Takahashi. "Multi-access Edge Computing: A Survey". Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Filali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane y Mohsen Guizani. "Multi-Access Edge Computing: A Survey". IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Newmann, Scott. "Multi-vendor interoperability through SQL access". ACM SIGMOD Record 21, n.º 2 (junio de 1992): 414. http://dx.doi.org/10.1145/141484.130345.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Dua, Aditya. "Random Access with Multi-Packet Reception". IEEE Transactions on Wireless Communications 7, n.º 6 (junio de 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Sachs, Joachim, Mikael Prytz y Jens Gebert. "Multi-access Management in Heterogeneous Networks". Wireless Personal Communications 48, n.º 1 (24 de noviembre de 2007): 7–32. http://dx.doi.org/10.1007/s11277-007-9431-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Altuntaş, Süleyman y Buyurman Baykal. "Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks". Computer Networks 47, n.º 4 (marzo de 2005): 577–92. http://dx.doi.org/10.1016/j.comnet.2004.03.036.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Davidson, I. J. A. "Access Centrale?: Access Clinic. Access Decisions and the Multi-Disciplinary Care Our Patients Deserve". Journal of Vascular Access 7, n.º 4 (octubre de 2006): 235–38. http://dx.doi.org/10.1177/112972980600700461.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Sachs, Joachim y Per Magnusson. "Assessment of the access selection gain in multi-radio access networks". European Transactions on Telecommunications 20, n.º 3 (abril de 2009): 265–79. http://dx.doi.org/10.1002/ett.1254.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Albonda, Haider D. y Sufian Yousef. "Multi-carrier coded division multiple access multiplexing against multi-path fading". International Journal of Electronic Security and Digital Forensics 6, n.º 2 (2014): 140. http://dx.doi.org/10.1504/ijesdf.2014.063111.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

AbdulKadhim, Noor y Mouiad Al-Wahah. "Semantic-Based Multi-Domain Data Access Authorization". Journal of Physics: Conference Series 1818, n.º 1 (1 de marzo de 2021): 012211. http://dx.doi.org/10.1088/1742-6596/1818/1/012211.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Lee, Hai-Wu. "Design of Multi-Functional Access Control System". IEEE Access 9 (2021): 85255–64. http://dx.doi.org/10.1109/access.2021.3087917.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Mishra, Shailendra y D. S. Chauhan. "Resource Allocation for Multi Access MIMO Systems". International Journal of Mobile Computing and Multimedia Communications 3, n.º 3 (julio de 2011): 36–50. http://dx.doi.org/10.4018/jmcmc.2011070103.

Texto completo
Resumen
In this paper, the authors discuss the emergence of new technologies related to the topic of the high-speed packet data access in wireless networks. The authors propose an algorithm for MIMO systems that optimizes the number of the transmit antennas according to the user’s QoS. Scheduling performance under two types of traffic modes is also discussed: one is voice or web-browsing and the other is for data transfer and streaming data.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Wu, Fangzhou, Li Chen, Nan Zhao, Yunfei Chen, F. Richard Yu y Guo Wei. "NOMA-Enhanced Computation Over Multi-Access Channels". IEEE Transactions on Wireless Communications 19, n.º 4 (abril de 2020): 2252–67. http://dx.doi.org/10.1109/twc.2019.2963654.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Sarakis, Lambros, George Kormentzas y Francisco Moya Guirao. "Seamless service provision for multi heterogeneous access". IEEE Wireless Communications 16, n.º 5 (octubre de 2009): 32–40. http://dx.doi.org/10.1109/mwc.2009.5300300.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Kolsi, Nader, Abdelaziz Abdellatif y Khaled Ghedira. "Data warehouse access using multi-agent system". Distributed and Parallel Databases 25, n.º 1-2 (21 de febrero de 2009): 29–45. http://dx.doi.org/10.1007/s10619-009-7036-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Robson, J. M. "Random access machines with multi-dimensional memories". Information Processing Letters 34, n.º 5 (mayo de 1990): 265–66. http://dx.doi.org/10.1016/0020-0190(90)90133-i.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Steinkoenig, Jan, Resat Aksakal y Filip Du Prez. "Molecular access to multi-dimensionally encoded information". European Polymer Journal 120 (noviembre de 2019): 109260. http://dx.doi.org/10.1016/j.eurpolymj.2019.109260.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Berendt, Annelise. "The changing landscape for multi access portals". Business Information Review 19, n.º 2 (junio de 2002): 21–29. http://dx.doi.org/10.1177/026638202321036204.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Tan, Mizhou, Pingping Zong y Yeheskel Bar-Ness. "Multi-Rate Access Schemes for MC-CDMA". Wireless Personal Communications 27, n.º 2 (noviembre de 2003): 149–82. http://dx.doi.org/10.1023/b:wire.0000003835.59701.43.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Abrantes, Filipe y Manuel Ricardo. "XCP for shared-access multi-rate media". ACM SIGCOMM Computer Communication Review 36, n.º 3 (5 de julio de 2006): 27–38. http://dx.doi.org/10.1145/1140086.1140091.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Antony Franklin, A. y Supriya Dilip Tambe. "Multi-access edge computing in cellular networks". CSI Transactions on ICT 8, n.º 1 (marzo de 2020): 85–92. http://dx.doi.org/10.1007/s40012-020-00276-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Malamas, Vangelis, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester y Dimitris Glynos. "Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments". Applied Sciences 13, n.º 1 (31 de diciembre de 2022): 566. http://dx.doi.org/10.3390/app13010566.

Texto completo
Resumen
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open challenge. We present HMBAC, a distributed fine-grained access control model for shared and dynamic multi-authority and multi-domain environments, along with Janus, a practical system for HMBAC policy enforcement. The proposed HMBAC model supports: (a) dynamic trust management between different authorities; (b) flexible access control policy enforcement, defined at the domain and cross-domain level; (c) a global source of truth for all entities, supported by an immutable, audit-friendly mechanism. Janus implements the HMBAC model and relies on the effective fusion of two core components. First, a Hierarchical Multi-Blockchain architecture that acts as a single access point that cannot be bypassed by users or authorities. Second, a Multi-Authority Attribute-Based Encryption protocol that supports flexible shared multi-owner encryption, where attribute keys from different authorities are combined to decrypt data distributedly stored in different authorities. Our approach was implemented using Hyperledger Fabric as the underlying blockchain, with the system components placed in Kubernetes Docker container pods. We experimentally validated the effectiveness and efficiency of Janus, while fully reproducible artifacts of both our implementation and our measurements are provided.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Hosono, Kohei, Akihiko Maki, Yousuke Watanabe, Hiroaki Takada y Kenya Sato. "Efficient Access Method for Multi-access Edge Servers in Dynamic Map Systems". International Journal of Intelligent Transportation Systems Research 20, n.º 1 (24 de enero de 2022): 252–65. http://dx.doi.org/10.1007/s13177-021-00289-8.

Texto completo
Resumen
AbstractResearch and development on connected cars equipped with communication functions is being conducted, and dynamic maps are being researched and developed as an information and communication platform for cooperative automatic driving. There is a concern about scalability when dynamic maps are constructed on a cloud server to aggregate a wide range of vehicle information. The problem can be alleviated by deploying edge servers that divide the geographic area where vehicles travel and manage each of them. The IP addresses of the edge servers need to be resolved on the basis of the location information of the moving vehicles. Using TCP improves reliability but reduces efficiency because the vehicles move. In this study, we developed a novel method for accessing edge servers that achieves higher reliability and efficiency by adopting UDP using anycast for transmission from vehicle to edge server and implementing a retransmission function. The effectiveness of this access method was verified by using a vehicle driving simulation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Mennes, Ruben, Felipe A. P. De Figueiredo y Steven Latre. "Multi-Agent Deep Learning for Multi-Channel Access in Slotted Wireless Networks". IEEE Access 8 (2020): 95032–45. http://dx.doi.org/10.1109/access.2020.2995456.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Aghamir, Seyed Mohammad Kazem, Reza Heidari, Seyedehsara Bayesh, Alborz Salavati y Reza Elmimehr. "Are Nephrostomy and Ureteral Stent Necessary after Multi-Access Percutaneous Nephrolithotomy?" Current Urology 13, n.º 3 (2019): 141–44. http://dx.doi.org/10.1159/000499279.

Texto completo
Resumen
Introduction: Totally tubeless percutaneous nephrolithotomy (PCNL) is a well-established technique used in single -access procedure nevertheless these results challenge the multi-access PCNL as a contra-indication to application of this technique. Aims: To compare complication rates and safety of use of this technique after multi-access PCNL. Methods: A Total of 130 patients with renal stones were enrolled in this cohort study. Totally tubeless PCNL with single access (Group A, n = 70) and multi-access (Group B, n = 60) were done and bleedings were assessed by measuring hemoglobin (Hb) drop, blood transfusion rate and need for angioembolization besides leakage rates which were also recorded. Results: In the 130 patients who underwent totally tubeless PCNL, no leakage from puncture site nor angioembolization cases were identified. There was no significant statistical differences between 2 groups regarding Hb drop (1.91 in single access versus 2.20 in multi-access), transfusion rate and length of hospital stay (p > 0.05). Stone-free rate was increased from 91% in single access to 97% in multi access by adding percutaneous access sites (from 91% in single access to 97% in multi-access). Conclusions: Multi-access totally tubeless PCNL seems feasible and has comparable complication rates including Hb drop besides providing the advantage of higher stone-free rates using multi-access tracts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

DONG Xiao-qing, 董晓庆, 程良伦 CHENG Liang-lun, 陈洪财 CHEN Hong-cai, 郑耿忠 ZHENG Geng-zhong y 谢森林 XIE Sen-lin. "Multi-objective optimization control method for multi-user multi-service access in heterogeneous wireless networks". Chinese Journal of Liquid Crystals and Displays 34, n.º 7 (2019): 708–15. http://dx.doi.org/10.3788/yjyxs20193407.0708.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Kapadia, Percy y Boon-Chong Seet. "Multi-Tier Cellular Handover with Multi-Access Edge Computing and Deep Learning". Telecom 2, n.º 4 (15 de noviembre de 2021): 446–71. http://dx.doi.org/10.3390/telecom2040026.

Texto completo
Resumen
This paper proposes a potential enhancement of handover for the next-generation multi-tier cellular network, utilizing two fifth-generation (5G) enabling technologies: multi-access edge computing (MEC) and machine learning (ML). MEC and ML techniques are the primary enablers for enhanced mobile broadband (eMBB) and ultra-reliable and low latency communication (URLLC). The subset of ML chosen for this research is deep learning (DL), as it is adept at learning long-term dependencies. A variant of artificial neural networks called a long short-term memory (LSTM) network is used in conjunction with a look-up table (LUT) as part of the proposed solution. Subsequently, edge computing virtualization methods are utilized to reduce handover latency and increase the overall throughput of the network. A realistic simulation of the proposed solution in a multi-tier 5G radio access network (RAN) showed a 40–60% improvement in overall throughput. Although the proposed scheme may increase the number of handovers, it is effective in reducing the handover failure (HOF) and ping-pong rates by 30% and 86%, respectively, compared to the current 3GPP scheme.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Apostolopoulos, Pavlos Athanasios, Eirini Eleni Tsiropoulou y Symeon Papavassiliou. "Risk-Aware Data Offloading in Multi-Server Multi-Access Edge Computing Environment". IEEE/ACM Transactions on Networking 28, n.º 3 (junio de 2020): 1405–18. http://dx.doi.org/10.1109/tnet.2020.2983119.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Inaba, Yuma y Eiji okamoto. "Multi-user chaos MIMO-OFDM scheme for physical layer multi-access security". Nonlinear Theory and Its Applications, IEICE 5, n.º 2 (2014): 172–83. http://dx.doi.org/10.1587/nolta.5.172.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Katsis, Petros, George Karagiannidis y Fotini-niovi Pavlidou. "Multi-user selection diversity for spread-spectrum multi-carrier multiple-access systems". IEEE Transactions on Communications 56, n.º 12 (diciembre de 2008): 2166–77. http://dx.doi.org/10.1109/tcomm.2008.050307.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Zheng, Jianchao, Honggang Zhang, Yueming Cai, Rongpeng Li y Alagan Anpalagan. "Game-Theoretic Multi-Channel Multi-Access in Energy Harvesting Wireless Sensor Networks". IEEE Sensors Journal 16, n.º 11 (junio de 2016): 4587–94. http://dx.doi.org/10.1109/jsen.2016.2539346.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Zhou, Yuchen, Jian Chen y Yonghong Kuo. "Fairness Resource Allocation for Parallel Multi-Radio Access in Cognitive Multi-Cell". Wireless Personal Communications 88, n.º 3 (21 de enero de 2016): 587–602. http://dx.doi.org/10.1007/s11277-016-3180-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Maiya, Megha y Bechir Hamdaoui. "iMAC: improved Medium Access Control for multi-channel multi-hop wireless networks". Wireless Communications and Mobile Computing 13, n.º 11 (19 de julio de 2011): 1060–71. http://dx.doi.org/10.1002/wcm.1160.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Gill, Simardeep, Robert Quinn, Matthew Oliver, Fareed Kamar, Rameez Kabani, Daniel Devoe, Priyanka Mysore et al. "Multi-Disciplinary Vascular Access Care and Access Outcomes in People Starting Hemodialysis Therapy". Clinical Journal of the American Society of Nephrology 12, n.º 12 (14 de septiembre de 2017): 1991–99. http://dx.doi.org/10.2215/cjn.03430317.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Li, Dou, Feng Wang, Bing-hui Ji y Hai-ge Xiang. "The Predictive Multi-Access access Channel Allocation Scheme in Broadband Satellite Mesh Network". Journal of Electronics & Information Technology 30, n.º 4 (11 de marzo de 2011): 763–67. http://dx.doi.org/10.3724/sp.j.1146.2006.01604.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Liu, Jing, Guochu Shou, Yaqiong Liu, Yihong Hu y Zhigang Guo. "Performance Evaluation of Integrated Multi-Access Edge Computing and Fiber-Wireless Access Networks". IEEE Access 6 (2018): 30269–79. http://dx.doi.org/10.1109/access.2018.2833619.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Sachs, Joachim y Magnus Olsson. "Access network discovery and selection in the evolved 3GPP multi-access system architecture". European Transactions on Telecommunications 21, n.º 6 (25 de abril de 2010): 544–57. http://dx.doi.org/10.1002/ett.1410.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Bande, Meghana, Akshayaa Magesh y Venugopal V. Veeravalli. "Dynamic Spectrum Access Using Stochastic Multi-User Bandits". IEEE Wireless Communications Letters 10, n.º 5 (mayo de 2021): 953–56. http://dx.doi.org/10.1109/lwc.2021.3051328.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Yu, Ye, Xiangyuan Bu, Kai Yang, Hongyuan Yang, Xiaozheng Gao y Zhu Han. "UAV-Aided Low Latency Multi-Access Edge Computing". IEEE Transactions on Vehicular Technology 70, n.º 5 (mayo de 2021): 4955–67. http://dx.doi.org/10.1109/tvt.2021.3072065.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Pencheva, Evelina N., Ivaylo I. Atanasov y Vladislav G. Vladislavov. "Mission Critical Messaging Using Multi-Access Edge Computing". Cybernetics and Information Technologies 19, n.º 4 (1 de noviembre de 2019): 73–89. http://dx.doi.org/10.2478/cait-2019-0037.

Texto completo
Resumen
Abstract 5th Generation (5G) mobile system is expected to support the requirements of mission critical communications for ultra reliability and availability, and very low latency. With the development of messaging and data transfer in mobile networks, mission critical communication users see more and more potential in data communications. In this paper, we explore the capabilities of Multi-access Edge Computing (MEC) that appears to be a key 5G component, to provide short messaging service at the network edge. The provided use cases illustrate the capabilities for transferring mobile originating and mobile terminating short messages to and from mission critical mobile edge applications. The data model describes the service resource structure and the Application Programming Interface definitions illustrate how the mobile edge applications can use the service. Some implementation aspects related to behavioral logic of the network and applications are provided. The performance analysis enables estimation of latency introduced by the service.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Borodin, V. V., A. M. Petrakov, V. A. Shevtsov y T. Ya Shevgunov. "Multi-Station Access without Acknowledgement in IoT Networks". Russian Aeronautics 62, n.º 3 (julio de 2019): 522–26. http://dx.doi.org/10.3103/s1068799819030243.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Pore, D., P. Hegade, D. Gaikwad, P. Patil y J. Patil. "Green Access to Multi-Component Synthesis of Spiropyranopyrazoles". Letters in Organic Chemistry 11, n.º 2 (31 de enero de 2014): 131–35. http://dx.doi.org/10.2174/15701786113106660069.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

BEN AYED, Souheil y Fumio TERAOKA. "Collaborative Access Control for Multi-Domain Cloud Computing". IEICE Transactions on Information and Systems E95.D, n.º 10 (2012): 2401–14. http://dx.doi.org/10.1587/transinf.e95.d.2401.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

R, Aishwarya Lakshmi y Sashi Kumar D R. "Two Factor Data Access Control – Multi Authority Control". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 6 (30 de junio de 2017): 537–67. http://dx.doi.org/10.23956/ijarcsse/v7i6/0306.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía