Gotowa bibliografia na temat „Access”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Access”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Access"
Milbourne, Andrea. "Access, access, access". Cancer 110, nr 5 (2007): 941–42. http://dx.doi.org/10.1002/cncr.22869.
Pełny tekst źródłaChepuru, Anitha, Dr K. Venugopal Rao i Amardeep Matta. "Server Access Control". International Journal of Scientific Research 1, nr 7 (1.06.2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Pełny tekst źródłaElliott, Deni, i Pamela S. Hogle. "Access Rights and Access Wrongs". International Journal of Applied Philosophy 27, nr 1 (2013): 1–14. http://dx.doi.org/10.5840/ijap20132716.
Pełny tekst źródłaDyke, Stephanie O. M., Mikael Linden, Ilkka Lappalainen, Jordi Rambla De Argila, Knox Carey, David Lloyd, J. Dylan Spalding i in. "Registered access: authorizing data access". European Journal of Human Genetics 26, nr 12 (2.08.2018): 1721–31. http://dx.doi.org/10.1038/s41431-018-0219-y.
Pełny tekst źródłaPackham, K. "Access all areas [Internet access]". Information Professional 1, nr 3 (1.08.2004): 36–39. http://dx.doi.org/10.1049/inp:20040308.
Pełny tekst źródłaKarabut, N. O., D. V. Shvets i S. O. Lukash. "Safe corporate network access". Mining Journal of Kryvyi Rih National University, nr 104 (2018): 47–50. http://dx.doi.org/10.31721/2306-5435-2018-1-104-47-50.
Pełny tekst źródłaKUNISAWA, Takashi, i Shuichi IWATA. "CODATA and "Open Access"". Joho Chishiki Gakkaishi 15, nr 3 (2005): 42–47. http://dx.doi.org/10.2964/jsik_kj00003803577.
Pełny tekst źródłaBOELLSTORFF, TOM. "Access". American Anthropologist 111, nr 1 (marzec 2009): 1–4. http://dx.doi.org/10.1111/j.1548-1433.2009.01067.x.
Pełny tekst źródłaWaters, Bryan A. "ACCESS". Public Library Quarterly 18, nr 2 (czerwiec 2000): 83. http://dx.doi.org/10.1300/j118v18n02_22.
Pełny tekst źródłaLavagnino, J. "Access". Literary and Linguistic Computing 24, nr 1 (1.04.2009): 63–76. http://dx.doi.org/10.1093/llc/fqn038.
Pełny tekst źródłaRozprawy doktorskie na temat "Access"
Conocimiento, Dirección de Gestión del. "Guía de acceso para Access Engineering". McGraw-Hill, 2021. http://hdl.handle.net/10757/655256.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Guía de acceso para Access Medicine". McGraw-Hill, 2021. http://hdl.handle.net/10757/655257.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Guía de acceso para Access Physiotherapy". McGraw-Hill, 2021. http://hdl.handle.net/10757/655258.
Pełny tekst źródłaSILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Pełny tekst źródłaO uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Atkins, Derek A. (Derek Allan). "Media Bank--access and access control". Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Pełny tekst źródłaByrnes, Collin DeMeere. "Access". This title; PDF viewer required Home page for entire collection, 2007. http://archives.udmercy.edu:8080/dspace/handle/10429/9.
Pełny tekst źródłaHoppenstand, Gregory S. "Secure access control with high access precision/". Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Pełny tekst źródłaGOMES, CARMEN ANTUNES. "RANDON ACCESS WITH NOTIFICATION: MULTIPLE ACCESS PROTOCOLS". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1993. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9396@1.
Pełny tekst źródłaEste trabalho propõe e analisa uma versão de um protocolo híbrido de acesso aleatório com notificação, desenvolvido para redes VSAT ( Very Small Aperture Terminal) onde se busca uma combinação do baixo tempo de resposta de protocolos do tipo RA-TDMA (Random Access-Time Division Multiple Access) . No protocolo aqui estudado as transmissões são feitas em uma primeira tentativa através de um esquema RA-TDMA e no caso de ocorrência de colisão, os pacotes envolvidos são retransmitidos através de um esquema DA-TDMA. As notificações de transmissões são feitas pelas estações VSAT, através de um canal de sinalização, onde é atribuído a cada uma delas um segmento de tempo, aqui referido como slot de tempo, de posição fixa dentro de cada quadro. O desempenho do protocolo é analisado utilizando a técnica de Análise no Ponto de Equilíbrio (EPA), sendo considerados como medida de desempenho os parâmetros retardo médio de mensagem, vazão e taxa de rejeição de pacotes. São consideradas mensagens de um pacote e mensagens de tamanho variável. Comparações com outros protocolos contendo buffer ou não, também analisados utilizando a técnica EPA, são realizadas. Resultados de simulação encontrados na literatura de dois outros protocolos são também apresentados.
A version of a random access with notification, multiple access protocol developed for VSAT networks is considered. This hybrid protocol combines the low response delay of RA- TDMA contention protocols with the efficiency and stability of DA-TDMA type protocols. In the considered protocol a message generated by a VSAT station is transmitted, in a first attempt, using a RA-TDMA type of scheme. If a collision occurs in this first transmission of the message the collided packets are retransmitted through a Demand Assignment (DA)-TDMA type of access. When a remote station transmits its message in a RA-TDMA contention mode it notifies the central hub using a separate TDMA channel in which a fixed position time slot is reserved to each station within a frame. The performance of the protocol is evaluated in terms of throughput, expected delay and packet rejection rate by means of the so called Equiilibrium Point Analysis (EPA). Single and multi-packet messages, with a random number of packets, are considered in the performance analysis. Comparisons with other hybrid protocols, which were also evaluated in the literature by means of the EPA technique or through simulation results, are presented.
Brown, Trevor Junior. "Time division multiple access/code division multiple access for the optical local access network". Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243716.
Pełny tekst źródłaKottahachchi, Buddhika. "ACCESS : Access Controls for Cooperatively Enabled Smart Spaces". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32101.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaves 75-79).
Traditionally, access control mechanisms have been static in nature, requiring explicit intervention in order to change their behavior. However, since security requirements can be expected to change frequently and rapidly in ubiquitous computing environments, access control mechanisms that can react to the context in which they are applied are desirable. With this in mind, we have created ACCESS (Access Controls for Cooperatively Enabled Smart Spaces); a framework for enabling dynamic, role-based and context-aware access control mechanisms in ubiquitous computing applications.
by Buddhika Kottahachchi.
M.Eng.
Książki na temat "Access"
Wurman, Richard Saul. Florence access, Venice access, Milan access. San Francisco: Access Press, 1991.
Znajdź pełny tekst źródła1938-, Cumming Peter A., Lee Enid i Oreopoulos D. G, red. Access! [Toronto, Ont.]: Ontario Ministry of Citizenship, 1989.
Znajdź pełny tekst źródła1935-, Wurman Richard Saul, i Access Press, red. Access. New York, NY: Access Press, 2006.
Znajdź pełny tekst źródłaCovello, Pietschmann Patti, red. Access. New York, NY: AccessPress, 2008.
Znajdź pełny tekst źródła1935-, Wurman Richard Saul, i Access Press, red. Access. New York, NY: Access Press, 2004.
Znajdź pełny tekst źródłaMohamed, Belinda. Access. USA: African Press, 2008.
Znajdź pełny tekst źródłaSteve, Davis. Access. New York: MIS Press, 1993.
Znajdź pełny tekst źródłaAccess? Helena, Mont.?] : International Right of Way Association Incorporated, Montana Big Sky Chapter 45 ; [Washington, D.C.?: Bureau of Land Management, 1987.
Znajdź pełny tekst źródłaAccess Accents Welsh South Access Accents. Methuen Publishing, 2008.
Znajdź pełny tekst źródłaAccess Accents An Accent Training Resource For Actors. Methuen Publishing, 2008.
Znajdź pełny tekst źródłaCzęści książek na temat "Access"
Al-Worafi, Yaser. "Access and Equitable Access". W A Guide to Online Pharmacy Education, 73–78. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003230458-13.
Pełny tekst źródłaOakley, Jacob G. "Access". W Waging Cyber War, 101–14. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4950-5_8.
Pełny tekst źródłaMcCowan, Tristan. "Access". W Palgrave Studies in Global Higher Education, 149–73. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19597-7_6.
Pełny tekst źródłaRodgers, James. "Access". W Reporting Conflict, 28–45. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00889-3_3.
Pełny tekst źródłaHersh, William. "Access". W Health Informatics, 261–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47686-1_6.
Pełny tekst źródłaWeik, Martin H. "access". W Computer Science and Communications Dictionary, 9. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_96.
Pełny tekst źródłaBadcock, Elly, Elise Bromann Bukhave i Jennifer Creek. "Access". W Theorising Occupational Therapy Practice in Diverse Settings, 100–121. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003016755-6.
Pełny tekst źródłaGibson, Johanna. "Access". W Intellectual Property, Medicine and Health, 145–71. 2nd edition. | New York, NY : Routledge, 2018. |: Routledge, 2017. http://dx.doi.org/10.4324/9781315589145-9.
Pełny tekst źródłaRérat, Patrick. "Access". W Cycling to Work, 59–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62256-5_6.
Pełny tekst źródłaStephens, Rod. "Access". W Microsoft Office Programming: A Guide for Experienced Developers, 469–522. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-0795-5_10.
Pełny tekst źródłaStreszczenia konferencji na temat "Access"
Ruobin Zheng, Wenle Yang i Jun Zhou. "Future access architecture: Software-defined accesss networking". W 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC). IEEE, 2014. http://dx.doi.org/10.1109/ccnc.2014.6940517.
Pełny tekst źródłaSchwarz, Michael, Raphael Stahl, Daniel Müller-Gritschneder, Ulf Schlichtmann, Dominik Stoffel i Wolfgang Kunz. "ACCESS". W DAC '19: The 56th Annual Design Automation Conference 2019. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3316781.3317756.
Pełny tekst źródłaParmanto, Bambang, Reza Ferrydiansyah, Andi Saptono, Lijing Song, I. Wayan Sugiantara i Stephanie Hackett. "AcceSS". W the 2005 International Cross-Disciplinary Workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1061811.1061815.
Pełny tekst źródłaYang, Yi, Yunqi Hu, Yidi Hong, Varun Joshi i Radhika Kolathumani. "Access". W CHI'16: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2851581.2889440.
Pełny tekst źródłaHeron, Michael, Vicki L. Hanson i Ian W. Ricketts. "ACCESS". W the 5th ACM SIGCHI symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2494603.2480316.
Pełny tekst źródłaBautin, Mikhail, Charles B. Ward, Akshay Patil i Steven S. Skiena. "Access". W the 19th international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1772690.1772889.
Pełny tekst źródłaAlmehmadi, Abdulaziz, i Khalil El-Khatib. "Authorized! access denied, unauthorized! access granted". W the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523612.
Pełny tekst źródłaKoudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs i H. Tang. "Access Flow based Multi-Radio Access Connectivity". W 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.
Pełny tekst źródłaKitova, E. T., N. I. Gorlov i I. V. Bogachkov. "Unauthorized Access Monitoring in Optical Access Networks". W 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2020. http://dx.doi.org/10.1109/synchroinfo49631.2020.9166039.
Pełny tekst źródłaCui, Tao, i Tracey Ho. "On multiple access random medium access control". W 2009 IEEE International Symposium on Information Theory - ISIT. IEEE, 2009. http://dx.doi.org/10.1109/isit.2009.5205457.
Pełny tekst źródłaRaporty organizacyjne na temat "Access"
Moline, Judi, i Steve Otto. Electronic access :. Gaithersburg, MD: National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.500-227.
Pełny tekst źródłaResearch Institute (IFPRI), International Food Policy. Market access. Washington, DC: International Food Policy Research Institute, 2014. http://dx.doi.org/10.2499/9780896298460_28.
Pełny tekst źródłaMoline, Judi, i Steve Otto. Electronic access:. Gaithersburg, MD: National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.ir.5616.
Pełny tekst źródłaPerini, Sofía C., Agustín Tejeda Rodríguez, Cristian Morales Opazo, Regine Weber i Silvia Helena Galvao de Miranda. Market access. Washington, DC: International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134832.
Pełny tekst źródłaCook, N. Internet Message Access Protocol (IMAP) - URL Access Identifier Extension. RFC Editor, czerwiec 2009. http://dx.doi.org/10.17487/rfc5593.
Pełny tekst źródłaKanugovi, S., F. Baboescu, J. Zhu i S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, marzec 2020. http://dx.doi.org/10.17487/rfc8743.
Pełny tekst źródłaHadfield, Amelia, i Andrej J. Zwitter. Open Access Publishing. Librello, lipiec 2013. http://dx.doi.org/10.12924/pag2013.01020102.
Pełny tekst źródłaKirsch, Emily. Access Innovation (Final). Office of Scientific and Technical Information (OSTI), kwiecień 2020. http://dx.doi.org/10.2172/1615933.
Pełny tekst źródłaKrishna, Kala, Suddhasatwa Roy i Marie Thursby. Implementing Market Access. Cambridge, MA: National Bureau of Economic Research, maj 1996. http://dx.doi.org/10.3386/w5593.
Pełny tekst źródłaKrishna, Kala, Suddhasatwa Roy i Marie Thursby. Procompetitive Market Access. Cambridge, MA: National Bureau of Economic Research, wrzesień 1997. http://dx.doi.org/10.3386/w6184.
Pełny tekst źródła