Gotowa bibliografia na temat „CONTENT ACCESS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „CONTENT ACCESS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "CONTENT ACCESS"
Moffett, Jonathan D., i Morris S. Sloman. "Content-dependent access control". ACM SIGOPS Operating Systems Review 25, nr 2 (kwiecień 1991): 63–70. http://dx.doi.org/10.1145/122120.122125.
Pełny tekst źródłaJalil Piran, Md, S. M. Riazul Islam i Doug Young Suh. "CASH: Content- and Network-Context-Aware Streaming Over 5G HetNets". IEEE Access 6 (2018): 46167–78. http://dx.doi.org/10.1109/access.2018.2864790.
Pełny tekst źródłaFan, Yuqi, Bing Yang, Donghui Hu, Xiaohui Yuan i Xiong Xu. "Social- and Content-Aware Prediction for Video Content Delivery". IEEE Access 8 (2020): 29219–27. http://dx.doi.org/10.1109/access.2020.2972920.
Pełny tekst źródłaKim, Guhyun, Vladimir Kornijcuk, Jeeson Kim, Dohun Kim, Cheol Seong Hwang i Doo Seok Jeong. "Combination-Encoding Content-Addressable Memory With High Content Density". IEEE Access 7 (2019): 137620–28. http://dx.doi.org/10.1109/access.2019.2942150.
Pełny tekst źródłaLi, Chengming, Shimin Gong, Xiaojie Wang, Lei Wang, Qingshan Jiang i Koji Okamura. "Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking". IEEE Access 6 (2018): 5727–39. http://dx.doi.org/10.1109/access.2017.2778502.
Pełny tekst źródłaRyu, Seung-Kwan, Chang-Hee Park i Jong-Bae Hong. "Content Analysis of Public Access Programs". Journal of the Korea Contents Association 12, nr 1 (28.01.2012): 146–53. http://dx.doi.org/10.5392/jkca.2012.12.01.146.
Pełny tekst źródłaGeißler, Stefan. "New methods to access scientific content". Information Services & Use 28, nr 2 (2.10.2008): 141–46. http://dx.doi.org/10.3233/isu-2008-0563.
Pełny tekst źródłaSchewe, Klaus Dieter, N. A. Kinshuk i Tiong Goh. "Content adaptivity in wireless web access". International Journal of Mobile Communications 2, nr 3 (2004): 260. http://dx.doi.org/10.1504/ijmc.2004.005164.
Pełny tekst źródłaDesai, Rutvik H. "Access and content of abstract concepts". Physics of Life Reviews 29 (lipiec 2019): 166–68. http://dx.doi.org/10.1016/j.plrev.2019.03.010.
Pełny tekst źródłaKoumpis, K., i S. Renals. "Content-based access to spoken audio". IEEE Signal Processing Magazine 22, nr 5 (wrzesień 2005): 61–69. http://dx.doi.org/10.1109/msp.2005.1511824.
Pełny tekst źródłaRozprawy doktorskie na temat "CONTENT ACCESS"
Helberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /". [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.
Pełny tekst źródłaWeiss, Ron 1970. "Content-based access to algebraic video". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/12044.
Pełny tekst źródłaFu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.
Pełny tekst źródłaVita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
Ragab, Hassen Hani. "Key management for content access control in hierarchical environments". Compiègne, 2007. http://www.theses.fr/2007COMP1718.
Pełny tekst źródłaLots of applications, ranging from interactive online games to business corporations and government departments, and from multi-layered data streaming to databases access control, require ensuring that its users respect some access control restrictions. Content access control in hierarchies (CACH) consists in ensuring, using cryptographic techniques, that the users access application resources to which they are entitled. Content access control is generally ensured by encrypting the system resources and giving the keys to users having access to them. Generating and managing those keys is a crucial requirement for the deployment of content access control systems. Moreover, large scale hierarchies with highly dynamic users present serious scalability issues for key management. In this thesis, we deal with key management for content access control. We start by defining building blocks of key management for CACH. Then, we study the existing key management solutions and classify them into two categories -namely, the dependent keys and independent keys approaches - and propose a key management framework for each category. We further propose a generic model to represent independent-keys key management schemes and use this model to define lower bounds on the key management overhead. Then, we propose a new independent-keys key management scheme and prove that it is optimal by showing that it reaches the overhead lower bounds. The optimality of this scheme constitutes one of the most important results of our thesis. Thereafter, we propose new efficient dependent-keys key management schemes and evaluate them by simulations and Markov process modelling. At last, we propose a variant of our schemes allowing to define trade-offs on the performance criteria. We show that this variant offers a means to define very interesting overhead trade-offs
He, Kun. "Content privacy and access control in image-sharing platforms". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Pełny tekst źródłaIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Gopal, Burra 1968. "Integrating content-based access mechanisms with hierarchical file systems". Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282291.
Pełny tekst źródłaPohl, Roland. "Qucosa: Quality Content of Saxony". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-32992.
Pełny tekst źródłaHermansson, Rickard, i Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents". Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.
Pełny tekst źródłaAtt enkelt dela dokument med arbetskollegor är något alla företag har ett behov utav.Ofta är dessa dokument interna och skall hållas inom företaget. Även inom företagetkan det finnas behov av att styra vem som har rätt att läsa ellerrevidera dokumenten.Denna examensarbetesrapport beskriver olika tekniker ochmodeller för accesskon-troll, versionshantering och distribution som kan användas för att implementera ettsystem som kan lösa de nämnda problemen.Ett av kraven för systemet var ett användargränssnitt där användare kan ladda upp ochned sina dokument. Ytterligare krav var att systemet skulleversionshantera dokumenetenoch att användare skall kunna komma åt de olika versionerna.Systemet skulle ocksåkunna hantera åtkomstkontroll på dokumentnivå, något denna examensrapport definerarsom "fine grained access control".För att designa ett sådant system så utredes och utvärderades olika tekniker kringåtkomstkontroll och versionshantering samt distributionav dokumenten. För att testasystemet så utvecklads en prototyp baserad på de valda lösningsmetoderna.Den resulterande prototypen uppfyllde de mål som Nordicstation satte för projektet,dock endast med grundläggande funktionalitet. Stöd för atthämta olika versioner avdokument, kontrollera access till dokumentet nere på dokument nivå och ett webbaseratgränssnitt för att administrera dokumenten.
Sambra-Petre, Raluca-Diana. "2D/3D knowledge inference for intelligent access to enriched visual content". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917972.
Pełny tekst źródłaKnox, Ian. "Web based regional newspapers : The role of content : A thesis". Thesis, University of Ballarat, 2002. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/43155.
Pełny tekst źródłaMaster of Business
Książki na temat "CONTENT ACCESS"
Perry, Brad, John Dinsmore, Shi-Kuo Chang, David Doermann, Azriel Rosenfeld i Scott Stevens. Content-Based Access to Multimedia Information. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5035-8.
Pełny tekst źródłaHelberger, Natali. Controlling access to content: Regulating conditional access in digital broadcasting. The Hague: Kluwer Law International, 2005.
Znajdź pełny tekst źródłaPiotr, Wasilewski. Open content: Zagadnienia prawne. Warszawa: Oficyna Wolters Kluwer Polska, 2008.
Znajdź pełny tekst źródłaLiang, Lawrence. Guide to open content licenses v1.2. Rotterdam: Piet Zwart Institute, Institute for Postgraduate Studies and Research, Willem de Kooning Academy, 2005.
Znajdź pełny tekst źródłaRasmussen, Kristi. The Gates public access content server: An easy guide. Seattle: Bill & Melinda Gates Foundation, 2002.
Znajdź pełny tekst źródłaEuropean Commission. Information Society DG., red. Access to capital for the content industries: Executive summary. Luxembourg: European Commission, Directorate-General for the Information Society, 2000.
Znajdź pełny tekst źródłaH, Lee Sul, red. Improved access to information: Portals, content selection, and digital information. Binghamton, NY: Haworth Information Press, 2003.
Znajdź pełny tekst źródłaCenter, Electronic Privacy Information, red. Filters and freedom: Free speech perspective on Internet content controls. Washington, DC: The Center, 1999.
Znajdź pełny tekst źródłaA, Parham Iris, Poon Leonard W. 1942- i Siegler Ilene C, red. ACCESS: Aging curriculum content for education in the social-behavioral sciences. New York: Springer Pub. Co., 1990.
Znajdź pełny tekst źródłaCenter, Electronic Privacy Information, red. Filters and freedom 2.0: Free speech perspective on Internet content controls. Wyd. 2. Washington, DC: The Center, 2001.
Znajdź pełny tekst źródłaCzęści książek na temat "CONTENT ACCESS"
Thomas, Jim, i Alan Turner. "Access and Retrieval of Digital Content". W Digital Content Creation, 1–8. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0293-9_1.
Pełny tekst źródłaFaloutsos, Christos. "Primary Key Access Methods". W Searching Multimedia Databases by Content, 11–17. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_3.
Pełny tekst źródłaFaloutsos, Christos. "Secondary Key Access Methods". W Searching Multimedia Databases by Content, 19–24. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_4.
Pełny tekst źródłaFaloutsos, Christos. "Spatial Access Methods (SAMS)". W Searching Multimedia Databases by Content, 25–39. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_5.
Pełny tekst źródłaFaloutsos, Christos. "Access Methods For Text". W Searching Multimedia Databases by Content, 41–54. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_6.
Pełny tekst źródłaLawless, Séamus, Owen Conlan i Cormac Hampson. "Tailoring Access to Content". W A New Companion to Digital Humanities, 171–84. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118680605.ch12.
Pełny tekst źródłaGiven, No Author. "Towards Semantic Universal Multimedia Access". W Visual Content Processing and Representation, 13–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39798-4_3.
Pełny tekst źródłaKőrösi, Attila, Balázs Székely i Miklós Máté. "Modeling the Content Popularity Evolution in Video-on-Demand Systems". W Access Networks, 47–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20931-4_4.
Pełny tekst źródłaBorsetti, Diego, Claudio Casetti, Carla-Fabiana Chiasserini i Luigi Liquori. "Content Discovery in Heterogeneous Mobile Networks". W Heterogeneous Wireless Access Networks, 1–20. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09777-0_15.
Pełny tekst źródłaJiménez, Tania, Yezekael Hayel i Eitan Altman. "Competition in Access to Content". W NETWORKING 2012, 211–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30054-7_17.
Pełny tekst źródłaStreszczenia konferencji na temat "CONTENT ACCESS"
Mohrehkesh, Shahram, Tamer Nadeem i Michele C. Weigle. "Context-aware content adaptation in access point". W the 2012 ACM Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2370216.2370384.
Pełny tekst źródłaKalman, Gyorgy, i Josef Noll. "User controlled content access". W 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.
Pełny tekst źródłaOluwatimi, Oyindamola, Daniele Midi i Elisa Bertino. "A Context-Aware System to Secure Enterprise Content". W SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2914642.2914648.
Pełny tekst źródłaKim, Younghyun, Haneul Ko i Sangheon Pack. "Reducing contents access latency in mobile content oriented networks". W 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983138.
Pełny tekst źródłaZeng, Wenrong, Yuhao Yang i Bo Luo. "Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases". W 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004294.
Pełny tekst źródłaSteiner, Moritz, Damiano Carra i Ernst W. Biersack. "Faster Content Access in KAD". W 2008 Eighth International Conference on Peer-to-Peer Computing (P2P). IEEE, 2008. http://dx.doi.org/10.1109/p2p.2008.28.
Pełny tekst źródłaHasan, Kamrul, Chanhong Park, Minsub Lee i Seong-Ho Jeong. "A cluster-based content access mechanism for Content-Centric Networking". W 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983206.
Pełny tekst źródłaWeiss, Duda i Gifford. "Content-based access to algebraic video". W Proceedings of IEEE International Conference on Multimedia Computing and Systems MMCS-94. IEEE Comput. Soc. Press, 1994. http://dx.doi.org/10.1109/mmcs.1994.292446.
Pełny tekst źródłaTeixeira, Dario, i Yassine Faihe. "In-home access to multimedia content". W the tenth ACM international conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/641007.641016.
Pełny tekst źródłaGunsel, B., S. Sariel i O. Icoglu. "Content-based access to art paintings". W rnational Conference on Image Processing. IEEE, 2005. http://dx.doi.org/10.1109/icip.2005.1530116.
Pełny tekst źródłaRaporty organizacyjne na temat "CONTENT ACCESS"
Pratt, C., D. Thakore i B. Stark. HTTP Random Access and Live Content. RFC Editor, listopad 2019. http://dx.doi.org/10.17487/rfc8673.
Pełny tekst źródłaLevinson, E. Message/External-Body Content-ID Access Type. RFC Editor, grudzień 1995. http://dx.doi.org/10.17487/rfc1873.
Pełny tekst źródłaZeilenga, K., i J. H. Choi. The Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation. RFC Editor, czerwiec 2006. http://dx.doi.org/10.17487/rfc4533.
Pełny tekst źródłaLi, Bing, Zhijie Wang, Dijiang Huang i Yan Zhu. Toward Privacy-preserving Content Access Control for Information Centric Networking. Fort Belvoir, VA: Defense Technical Information Center, marzec 2014. http://dx.doi.org/10.21236/ada606547.
Pełny tekst źródłaKlosek, Katherine. Copyright and Contracts: Issues and Strategies. Association of Research Libraries, lipiec 2022. http://dx.doi.org/10.29242/report.copyrightandcontracts2022.
Pełny tekst źródłaMintii, I. S. Using Learning Content Management System Moodle in Kryvyi Rih State Pedagogical University educational process. [б. в.], lipiec 2020. http://dx.doi.org/10.31812/123456789/3866.
Pełny tekst źródłaGroeneveld, Caspar, Elia Kibga i Tom Kaye. Deploying an e-Learning Environment in Zanzibar: Feasibility Assessment. EdTech Hub, lipiec 2020. http://dx.doi.org/10.53832/edtechhub.0028.
Pełny tekst źródłaChoquette, Gary. PR-000-23COMP-R04 Aboveground Tank Corrosion Comprehensive Compendium. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2023. http://dx.doi.org/10.55274/r0000019.
Pełny tekst źródłaMelnyk, Yuriy. Academic Journal Website Model. KRPOCH, 2018. http://dx.doi.org/10.26697/preprint.melnyk.1.2018.
Pełny tekst źródłaChoquette, Gary. PR-000-23COMP-R05 Pipe Wrinkles Comprehensive Compendia. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2023. http://dx.doi.org/10.55274/r0000020.
Pełny tekst źródła