Gotowa bibliografia na temat „CONTENT ACCESS”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „CONTENT ACCESS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "CONTENT ACCESS"

1

Moffett, Jonathan D., i Morris S. Sloman. "Content-dependent access control". ACM SIGOPS Operating Systems Review 25, nr 2 (kwiecień 1991): 63–70. http://dx.doi.org/10.1145/122120.122125.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jalil Piran, Md, S. M. Riazul Islam i Doug Young Suh. "CASH: Content- and Network-Context-Aware Streaming Over 5G HetNets". IEEE Access 6 (2018): 46167–78. http://dx.doi.org/10.1109/access.2018.2864790.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Fan, Yuqi, Bing Yang, Donghui Hu, Xiaohui Yuan i Xiong Xu. "Social- and Content-Aware Prediction for Video Content Delivery". IEEE Access 8 (2020): 29219–27. http://dx.doi.org/10.1109/access.2020.2972920.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kim, Guhyun, Vladimir Kornijcuk, Jeeson Kim, Dohun Kim, Cheol Seong Hwang i Doo Seok Jeong. "Combination-Encoding Content-Addressable Memory With High Content Density". IEEE Access 7 (2019): 137620–28. http://dx.doi.org/10.1109/access.2019.2942150.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Li, Chengming, Shimin Gong, Xiaojie Wang, Lei Wang, Qingshan Jiang i Koji Okamura. "Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking". IEEE Access 6 (2018): 5727–39. http://dx.doi.org/10.1109/access.2017.2778502.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ryu, Seung-Kwan, Chang-Hee Park i Jong-Bae Hong. "Content Analysis of Public Access Programs". Journal of the Korea Contents Association 12, nr 1 (28.01.2012): 146–53. http://dx.doi.org/10.5392/jkca.2012.12.01.146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Geißler, Stefan. "New methods to access scientific content". Information Services & Use 28, nr 2 (2.10.2008): 141–46. http://dx.doi.org/10.3233/isu-2008-0563.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Schewe, Klaus Dieter, N. A. Kinshuk i Tiong Goh. "Content adaptivity in wireless web access". International Journal of Mobile Communications 2, nr 3 (2004): 260. http://dx.doi.org/10.1504/ijmc.2004.005164.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Desai, Rutvik H. "Access and content of abstract concepts". Physics of Life Reviews 29 (lipiec 2019): 166–68. http://dx.doi.org/10.1016/j.plrev.2019.03.010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Koumpis, K., i S. Renals. "Content-based access to spoken audio". IEEE Signal Processing Magazine 22, nr 5 (wrzesień 2005): 61–69. http://dx.doi.org/10.1109/msp.2005.1511824.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "CONTENT ACCESS"

1

Helberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /". [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Weiss, Ron 1970. "Content-based access to algebraic video". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/12044.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Fu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Vita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
Style APA, Harvard, Vancouver, ISO itp.
4

Ragab, Hassen Hani. "Key management for content access control in hierarchical environments". Compiègne, 2007. http://www.theses.fr/2007COMP1718.

Pełny tekst źródła
Streszczenie:
Le besoin du contrôle d'accès au contenu dans les hiérarchies (CACH) apparaît naturellement dans de nombreux contextes, allant des départements gouvernementaux aux jeux interactifs, et de la diffusion multi-niveaux des données au contrôle d'accès dans les bases de données. Tous ces contextes ont un point commun, c'est d'avoir besoin de s'assurer que les différentes entités n'accèdent qu'aux ressources auxquelles elles sont autorisées. Le contrôle d'accès au contenu consiste à effectuer cette dernière tâche. Contrôler l'accès aux ressources est généralement assuré en chiffrant les ressources du système et en donnant les clés utilisées pour le chiffrement de ces ressources aux utilisateurs qui y sont autorisés. La génération et la gestion de telles clés est un besoin crucial pour le déploiement des systèmes de contrôle d'accès au contenu. De plus, les hiérarchies à large échelle avec des membres qui changent leurs droits d'accès fréquemment exigent un passage à l'échelle performant du mécanisme de gestion de clés. Dans le cadre de cette thèse, nous nous focalisons sur la gestion de clés pour le contrôle d'accès au contenu. Nous commençons par donner les briques de base de la gestion de clés pour le CACH. Par la suite, nous étudions les schémas de gestion de clés existants et les classifions en deux catégories, à savoir l'approche des clés dépendantes et l'approche des clés indépendantes. Par ailleurs, nous proposons un modèle générique pour représenter les schémas de l'approche des clés indépendantes et l'utilisons pour définir des bornes inférieures sur les coûts de gestion des clés. Par la suite, nous proposons un nouveau schéma indépendant de gestion de clé et prouvons son optimalité en montrant que ses performances atteignent les bornes inférieures. L'optimalité de ce schéma constitue l'un des apports les plus importants de cette thèse. Ensuite, nous proposons deux nouveaux schémas efficaces de l'approche des clés dépendantes et nous les évaluons par simulations et par une modélisation avec les processus de Markov. Enfin, nous proposons une variante de ces schémas qui permet de définir des compromis pertinents sur les différents critères de performances
Lots of applications, ranging from interactive online games to business corporations and government departments, and from multi-layered data streaming to databases access control, require ensuring that its users respect some access control restrictions. Content access control in hierarchies (CACH) consists in ensuring, using cryptographic techniques, that the users access application resources to which they are entitled. Content access control is generally ensured by encrypting the system resources and giving the keys to users having access to them. Generating and managing those keys is a crucial requirement for the deployment of content access control systems. Moreover, large scale hierarchies with highly dynamic users present serious scalability issues for key management. In this thesis, we deal with key management for content access control. We start by defining building blocks of key management for CACH. Then, we study the existing key management solutions and classify them into two categories -namely, the dependent keys and independent keys approaches - and propose a key management framework for each category. We further propose a generic model to represent independent-keys key management schemes and use this model to define lower bounds on the key management overhead. Then, we propose a new independent-keys key management scheme and prove that it is optimal by showing that it reaches the overhead lower bounds. The optimality of this scheme constitutes one of the most important results of our thesis. Thereafter, we propose new efficient dependent-keys key management schemes and evaluate them by simulations and Markov process modelling. At last, we propose a variant of our schemes allowing to define trade-offs on the performance criteria. We show that this variant offers a means to define very interesting overhead trade-offs
Style APA, Harvard, Vancouver, ISO itp.
5

He, Kun. "Content privacy and access control in image-sharing platforms". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.

Pełny tekst źródła
Streszczenie:
Au cours de ces dernières années, de plus en plus d’utilisateurs choisissent de diffuser leurs photos sur des plateformes de partage d’images. Ces plateformes permettent aux utilisateurs de restreindre l’accès aux images à un groupe de personnes, afin de donner un sentiment de confiance aux utilisateurs vis-à-vis de la confidentialité de ces images. Malheureusement, la confidentialité ne peut être garantie sachant que le fournisseur de la plateforme a accès aux contenus de n’importe quelle image publiée sur sa plateforme. En revanche, si les images sont mises en ligne chiffrées, seules les personnes ayant la possibilité de déchiffrer les images, auront accès aux images. Ainsi, la confidentialité peut être assurée. Trois principales spécificités sont à prendre en compte lors du chiffrement d’une image : le schéma de chiffrement doit être effectué en respectant le format de l’image (e.g. format JPEG), garantir l’indistinguabilité (l’adversaire ne doit obtenir de l’information sur le contenu de l’image à partir de l’image chiffrée), et doit être compatible avec les traitements des images spécifiques à la plateforme de partage d’images. L’objectif principal de cette thèse a été de proposer un tel schéma de chiffrement pour les images JPEG. Nous avons d’abord proposé et implémenté un schéma de chiffrement garantissant la conservation de l’image et l’indistinguabilité. Malheureusement, nous avons montré que sur Facebook, Instagram, Weibo et Wechat, notre solution ne permettait de maintenir une qualité d’images suffisante après déchiffrement. Par conséquent, des codes correcteurs ont été ajoutés à notre schéma de chiffrement, afin de maintenir la qualité des images
In recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Style APA, Harvard, Vancouver, ISO itp.
6

Gopal, Burra 1968. "Integrating content-based access mechanisms with hierarchical file systems". Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282291.

Pełny tekst źródła
Streszczenie:
We describe a new file system that provides, at the same time, both name and content based access to files. To make this possible, we introduce the concept of a semantic directory. Every semantic directory has a query associated with it. When a user creates a semantic directory, the file system automatically creates a set of pointers to the files in the file system that satisfy the query associated with the directory. This set of pointers is called the query-result of the directory. To access the files that satisfy the query, users just need to de-reference the appropriate pointers. Users can also create files and sub-directories within semantic directories in the usual way. Hence, users can organize files in a hierarchy and access them by specifying path names, and at the same time, retrieve files by asking queries that describe their content. Our file system also provides facilities for query-refinement and customization. When a user creates a new semantic sub-directory within a semantic directory, the file system ensures that the query-result of the sub-directory is a subset of the query-result of its parent. Hence, users can create a hierarchy of semantic directories to refine their queries. Users can also edit the set of pointers in a semantic directory, and thereby modify its query-result without modifying its query or the files in the file system. In this way, users can customize the results of queries according to their personal tastes, and use customized results to refine queries in the future. Our file system has many other features, including semantic mount-points that allow users to access information in other file systems by content. The file system does not depend on the query language used for content-based access. Hence, it is possible to integrate any content-based access mechanism into our file system.
Style APA, Harvard, Vancouver, ISO itp.
7

Pohl, Roland. "Qucosa: Quality Content of Saxony". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-32992.

Pełny tekst źródła
Streszczenie:
Die sächsischen Hochschulbibliotheken verfügten bisher nur über eigene, auf die jeweilige Einrichtung beschränkte Hochschulschriftenserver. Qucosa, das der kostenlosen Publikation und dauerhaften Archivierung von elektronischen Diplomarbeiten, Dissertationen und anderen Veröffentlichungen dient, eröffnet den sächsischen Hochschulbibliotheken neue Perspektiven und bildet eines der Elemente einer „Digitalen Bibliothek“ in Sachsen. Bereits mehrere sächsische Hochschulen und Forschungsinstitute benutzen Qucosa zur Publizierung der eigenen Forschungsergebnisse. Auch nichtwissenschaftliche, staatliche Einrichtungen werden zukünftig ihre Schriften auf Qucosa im Volltext anbieten.
Style APA, Harvard, Vancouver, ISO itp.
8

Hermansson, Rickard, i Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents". Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.

Pełny tekst źródła
Streszczenie:
A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments.This paper shows different systems and models for access control, version control,and distribution of the documents that can be used to create asystem that solves theseproblems.One requirement for this system was a user interface where users can upload, down-load and manage access to their documents. Another requirement was a service thathandles version control for the documents, and a way to quickly connect and distributethe documents. The system also needed to be able to handle access control of the ver-sioned documents on document level, referred to as "fine grained access control" in thispaper.These models and systems were evaluated based on aspects of the access control mod-els, version control systems, and distribution systems andprotocols. After evaluating,appropriate selections were made to create a prototype to test the system as a whole.The prototype ended up meeting the goals that Nordicstationset for the project butonly with basic functionality. Functionality for retrieving any version from a docu-ments history, controlling access for the documents at document level, and a simpleweb based user interface for managing the documents.
Att enkelt dela dokument med arbetskollegor är något alla företag har ett behov utav.Ofta är dessa dokument interna och skall hållas inom företaget. Även inom företagetkan det finnas behov av att styra vem som har rätt att läsa ellerrevidera dokumenten.Denna examensarbetesrapport beskriver olika tekniker ochmodeller för accesskon-troll, versionshantering och distribution som kan användas för att implementera ettsystem som kan lösa de nämnda problemen.Ett av kraven för systemet var ett användargränssnitt där användare kan ladda upp ochned sina dokument. Ytterligare krav var att systemet skulleversionshantera dokumenetenoch att användare skall kunna komma åt de olika versionerna.Systemet skulle ocksåkunna hantera åtkomstkontroll på dokumentnivå, något denna examensrapport definerarsom "fine grained access control".För att designa ett sådant system så utredes och utvärderades olika tekniker kringåtkomstkontroll och versionshantering samt distributionav dokumenten. För att testasystemet så utvecklads en prototyp baserad på de valda lösningsmetoderna.Den resulterande prototypen uppfyllde de mål som Nordicstation satte för projektet,dock endast med grundläggande funktionalitet. Stöd för atthämta olika versioner avdokument, kontrollera access till dokumentet nere på dokument nivå och ett webbaseratgränssnitt för att administrera dokumenten.
Style APA, Harvard, Vancouver, ISO itp.
9

Sambra-Petre, Raluca-Diana. "2D/3D knowledge inference for intelligent access to enriched visual content". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917972.

Pełny tekst źródła
Streszczenie:
This Ph.D. thesis tackles the issue of sill and video object categorization. The objective is to associate semantic labels to 2D objects present in natural images/videos. The principle of the proposed approach consists of exploiting categorized 3D model repositories in order to identify unknown 2D objects based on 2D/3D matching techniques. We propose here an object recognition framework, designed to work for real time applications. The similarity between classified 3D models and unknown 2D content is evaluated with the help of the 2D/3D description. A voting procedure is further employed in order to determine the most probable categories of the 2D object. A representative viewing angle selection strategy and a new contour based descriptor (so-called AH), are proposed. The experimental evaluation proved that, by employing the intelligent selection of views, the number of projections can be decreased significantly (up to 5 times) while obtaining similar performance. The results have also shown the superiority of AH with respect to other state of the art descriptors. An objective evaluation of the intra and inter class variability of the 3D model repositories involved in this work is also proposed, together with a comparative study of the retained indexing approaches . An interactive, scribble-based segmentation approach is also introduced. The proposed method is specifically designed to overcome compression artefacts such as those introduced by JPEG compression. We finally present an indexing/retrieval/classification Web platform, so-called Diana, which integrates the various methodologies employed in this thesis
Style APA, Harvard, Vancouver, ISO itp.
10

Knox, Ian. "Web based regional newspapers : The role of content : A thesis". Thesis, University of Ballarat, 2002. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/43155.

Pełny tekst źródła
Streszczenie:
The phenomenon and acceptance of electronic publishing has proliferated in the last five years due to the expansion in the use of the World Wide Web in the general community. The initial fears that newspapers would be decimated by the introduction of this technology have been proven groundless, but despite a high web presence by newspapers world wide, profitable models of cyber papers are elusive. In an online environment traditional relationships between newspaper advertising and editorial may not stand. Despite the considerable body of published literature concerning the movement of print newspapers to an online environment, little was found concerning online content. A need to re-evaluate what content and functions are considered to be desirable by print readers, in an online environment was identified as the main objective of this research. Evaluation the of user attitudes to web based newspapers provides a foundation for future research into areas such as developing effective models for profitable online newspapers. To achieve this objective, the research tools used were a content analysis, an online newspaper user survey and newspaper management personal interviews. The study looked at Victorian regional daily newspapers that also had online versions. By focussing on the regional newspapers, meaningful comparisons could be made between content, staff attitudes and readership interests. The content analysis measured the quantum and nature of the content of the print and online versions of the regional dailies during a one week period. This provided a measure of the type and source of the articles included both in print and online. Newspaper editorial staff interviews contributed a personalised view of content priorities, which was then contrasted with a web based questionnaire which measured user requirements in relation to content and interactivity. It was found from the survey that content alone would not provide a sufficient basis to build a profitable online regional newspaper site. The findings were analysed in relation to the literature, newspaper site content and editorial staff interviews. Despite regularly accessing online newspaper sites, it was found that users are unwilling to pay for the experience. Users indicated a desire for a higher level of interactivity, in addition to the content, which is currently provided, by online regional newspapers. Evaluation of user attitudes to web based newspapers provides a foundation for future research into the development of effective for profitable online newspapers.
Master of Business
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "CONTENT ACCESS"

1

Perry, Brad, John Dinsmore, Shi-Kuo Chang, David Doermann, Azriel Rosenfeld i Scott Stevens. Content-Based Access to Multimedia Information. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5035-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Helberger, Natali. Controlling access to content: Regulating conditional access in digital broadcasting. The Hague: Kluwer Law International, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Piotr, Wasilewski. Open content: Zagadnienia prawne. Warszawa: Oficyna Wolters Kluwer Polska, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Liang, Lawrence. Guide to open content licenses v1.2. Rotterdam: Piet Zwart Institute, Institute for Postgraduate Studies and Research, Willem de Kooning Academy, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rasmussen, Kristi. The Gates public access content server: An easy guide. Seattle: Bill & Melinda Gates Foundation, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

European Commission. Information Society DG., red. Access to capital for the content industries: Executive summary. Luxembourg: European Commission, Directorate-General for the Information Society, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

H, Lee Sul, red. Improved access to information: Portals, content selection, and digital information. Binghamton, NY: Haworth Information Press, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Center, Electronic Privacy Information, red. Filters and freedom: Free speech perspective on Internet content controls. Washington, DC: The Center, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

A, Parham Iris, Poon Leonard W. 1942- i Siegler Ilene C, red. ACCESS: Aging curriculum content for education in the social-behavioral sciences. New York: Springer Pub. Co., 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Center, Electronic Privacy Information, red. Filters and freedom 2.0: Free speech perspective on Internet content controls. Wyd. 2. Washington, DC: The Center, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "CONTENT ACCESS"

1

Thomas, Jim, i Alan Turner. "Access and Retrieval of Digital Content". W Digital Content Creation, 1–8. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0293-9_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Faloutsos, Christos. "Primary Key Access Methods". W Searching Multimedia Databases by Content, 11–17. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Faloutsos, Christos. "Secondary Key Access Methods". W Searching Multimedia Databases by Content, 19–24. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Faloutsos, Christos. "Spatial Access Methods (SAMS)". W Searching Multimedia Databases by Content, 25–39. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Faloutsos, Christos. "Access Methods For Text". W Searching Multimedia Databases by Content, 41–54. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lawless, Séamus, Owen Conlan i Cormac Hampson. "Tailoring Access to Content". W A New Companion to Digital Humanities, 171–84. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118680605.ch12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Given, No Author. "Towards Semantic Universal Multimedia Access". W Visual Content Processing and Representation, 13–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39798-4_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kőrösi, Attila, Balázs Székely i Miklós Máté. "Modeling the Content Popularity Evolution in Video-on-Demand Systems". W Access Networks, 47–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20931-4_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Borsetti, Diego, Claudio Casetti, Carla-Fabiana Chiasserini i Luigi Liquori. "Content Discovery in Heterogeneous Mobile Networks". W Heterogeneous Wireless Access Networks, 1–20. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09777-0_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Jiménez, Tania, Yezekael Hayel i Eitan Altman. "Competition in Access to Content". W NETWORKING 2012, 211–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30054-7_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "CONTENT ACCESS"

1

Mohrehkesh, Shahram, Tamer Nadeem i Michele C. Weigle. "Context-aware content adaptation in access point". W the 2012 ACM Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2370216.2370384.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kalman, Gyorgy, i Josef Noll. "User controlled content access". W 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Oluwatimi, Oyindamola, Daniele Midi i Elisa Bertino. "A Context-Aware System to Secure Enterprise Content". W SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2914642.2914648.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kim, Younghyun, Haneul Ko i Sangheon Pack. "Reducing contents access latency in mobile content oriented networks". W 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983138.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zeng, Wenrong, Yuhao Yang i Bo Luo. "Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases". W 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004294.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Steiner, Moritz, Damiano Carra i Ernst W. Biersack. "Faster Content Access in KAD". W 2008 Eighth International Conference on Peer-to-Peer Computing (P2P). IEEE, 2008. http://dx.doi.org/10.1109/p2p.2008.28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hasan, Kamrul, Chanhong Park, Minsub Lee i Seong-Ho Jeong. "A cluster-based content access mechanism for Content-Centric Networking". W 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983206.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weiss, Duda i Gifford. "Content-based access to algebraic video". W Proceedings of IEEE International Conference on Multimedia Computing and Systems MMCS-94. IEEE Comput. Soc. Press, 1994. http://dx.doi.org/10.1109/mmcs.1994.292446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Teixeira, Dario, i Yassine Faihe. "In-home access to multimedia content". W the tenth ACM international conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/641007.641016.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gunsel, B., S. Sariel i O. Icoglu. "Content-based access to art paintings". W rnational Conference on Image Processing. IEEE, 2005. http://dx.doi.org/10.1109/icip.2005.1530116.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "CONTENT ACCESS"

1

Pratt, C., D. Thakore i B. Stark. HTTP Random Access and Live Content. RFC Editor, listopad 2019. http://dx.doi.org/10.17487/rfc8673.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Levinson, E. Message/External-Body Content-ID Access Type. RFC Editor, grudzień 1995. http://dx.doi.org/10.17487/rfc1873.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zeilenga, K., i J. H. Choi. The Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation. RFC Editor, czerwiec 2006. http://dx.doi.org/10.17487/rfc4533.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Li, Bing, Zhijie Wang, Dijiang Huang i Yan Zhu. Toward Privacy-preserving Content Access Control for Information Centric Networking. Fort Belvoir, VA: Defense Technical Information Center, marzec 2014. http://dx.doi.org/10.21236/ada606547.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Klosek, Katherine. Copyright and Contracts: Issues and Strategies. Association of Research Libraries, lipiec 2022. http://dx.doi.org/10.29242/report.copyrightandcontracts2022.

Pełny tekst źródła
Streszczenie:
In 2020, ARL’s Advocacy and Public Policy Committee launched a digital rights initiative focused on understanding and safeguarding the full stack of research libraries’ rights: to acquire and lend digital content to fulfill libraries’ functions in research, teaching, and learning; to provide accessible works to people with print disabilities; and to fulfill libraries’ collective preservation function for enduring access to scholarly and cultural works. Our objective is to make sure that these rights are well understood by research libraries, by Congress, by the US Copyright Office, and by the courts. This report discusses licenses and contracts for digital content in the context of the US Copyright Act. The report presents advocacy and public policy strategies, such as rights-saving clauses, open access, state strategies, and federal exemptions. The report concludes with next steps, including a test case and ARL strategies.
Style APA, Harvard, Vancouver, ISO itp.
6

Mintii, I. S. Using Learning Content Management System Moodle in Kryvyi Rih State Pedagogical University educational process. [б. в.], lipiec 2020. http://dx.doi.org/10.31812/123456789/3866.

Pełny tekst źródła
Streszczenie:
The article analyzes the results of the survey of 75 lecturers on using learning content management system (LCMS) Moodle in the educational process. It is defined that more than 75% of the respondents use LCMS Moodle. The lecturers up to 30 or over 60 years old, with up to 3-year-work experience in Universities need methodic assistance. Textual e-learning resources are widely used in developed courses while video and audio are not used enough. LCMS Moodle is mostly used during exams or tests and student work, and using LCMS Moodle should be intensified in lectures, laboratory and practical classes. Among the most demanded resources are label, page, file, URL, book, assignment, attendance, glossary, quiz. Thus, the popularization of other resources is identified as one of the most important. An action plan how to improve LCMS Moodle usage: increasing the IT competencies of both teachers and students – planned long-term courses “IT in full-time (blended) learning”; seminars, consultations, (group and individual forms) both on general issues, and according to the specificity of the specialties; methodic handouts and recommendations; improving logistics; improving logistical support – ensuring constant access to the Internet, updating and equipping computer classrooms; creating of transparent, predictable and attractive for authors content of the regulatory framework.
Style APA, Harvard, Vancouver, ISO itp.
7

Groeneveld, Caspar, Elia Kibga i Tom Kaye. Deploying an e-Learning Environment in Zanzibar: Feasibility Assessment. EdTech Hub, lipiec 2020. http://dx.doi.org/10.53832/edtechhub.0028.

Pełny tekst źródła
Streszczenie:
The Zanzibar Ministry of Education and Vocational Training (MoEVT) and the World Bank (the Bank) approached the EdTech Hub (the Hub) in April 2020 to explore the feasibility of implementing a Virtual Learning Environment (VLE). The Hub was requested to focus primarily on the deployment of a VLE in lower secondary education, and this report consequently focuses primarily on this group. The report is structured in four sections: An introduction to provide the background and guiding principles for the engagement with a short overview of the methodology applied. An analysis of the Zanzibar education system with a particular focus on elements relevant to deploying a VLE. This includes the status of ICT infrastructure, and a summary of the stakeholders who will play a role in using or implementing a VLE. A third section that discusses types of VLEs and content organisation, and their applicability to the Zanzibar ecosystem. A conclusion with recommendations for Zanzibar, including short- and long-term steps. In this collaboration with Zanzibar’s MoEVT, the Hub team sought to understand the purpose of the proposed VLE. Based on discussions and user scenarios, we identified two main education challenges a VLE may help to resolve. In the short term, students cannot go to school during the COVID-19 crisis, but need access to educational content. There is content, but no flexible and versatile platform to disseminate content to all students. In the long term, a mechanism to provide students with access to quality, curriculum-aligned content in school, or remotely, is required.
Style APA, Harvard, Vancouver, ISO itp.
8

Choquette, Gary. PR-000-23COMP-R04 Aboveground Tank Corrosion Comprehensive Compendium. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2023. http://dx.doi.org/10.55274/r0000019.

Pełny tekst źródła
Streszczenie:
This compendium is a selection of past PRCI research related to aboveground tank corrosion. Metadata is provided for each resource (when available) including the length of the report, its abstract, author(s), and company that performed the research. The process of identifying reports for this compendium involved keyword searches of all PRCI research documents (and in some cases, research by others). The list of documents identified in that keyword match was then manually reviewed for relevance. Documents that had content that was not directly relevant to the topic of this compendium, had minimal information, or duplicated information were excluded. Specifically, this study reviewed 73 documents and only selected 18 documents that were deemed relevant. Key excerpts and/or notes were taken from those documents and are included here. In many cases, the excerpt/notes are adequate such that the source document does not need to be read separately. However, there are some documents that contain much more content than can be adequately summarized herein. In those cases, the note recommends reviewing that document in its entirety. Links to each of the reports are provided to help facilitate quick access to the related reports. A valid PRCI account is needed to access these links on the PRCI website.
Style APA, Harvard, Vancouver, ISO itp.
9

Melnyk, Yuriy. Academic Journal Website Model. KRPOCH, 2018. http://dx.doi.org/10.26697/preprint.melnyk.1.2018.

Pełny tekst źródła
Streszczenie:
Background: The tens of thousands of academic journal websites that are on the Internet today often do not have a clear organizational structure for their website. If most of them are convenient enough for readers (if the journal is open access), then many have problems informing authors about the conditions, the process of submitting and reviewing the manuscript. The Editorial Offices empirically populate the journal's website with content that can change dramatically (both in terms of website design and content) as the journal develops. Aim of Study: To develop a website model for an academic journal that takes into account the basic requirements for the preparation, publication, and archiving of high quality scientific manuscripts. Material and Methods: The academic journal website model is based on a structural-functional approach. The website content consists of text and integrated applications. This model takes into account the basic requirements for the preparation, publication, and archiving of high-quality open access scientific manuscripts, as well as the indexing of journal articles by leading indexing agencies. Results: The academic journal website model is structured with the following menu and submenu elements: 1. HOME: 1.1. Journal information; 1.2. From the editorial office; 1.3. Databases, Indexing; 2. EDITORIAL BOARD: 2.1. Editorial board; 2.2. Reviewers; 2.3. Editing and reviewing process; 3. EDITORIAL POLICIES: 3.1. Editorial policies; 3.2. Plagiarism policy; 3.3. Open access policy; 3.4. The ethics codex of scientific publications; 3.5. Disclaimer; 3.6. License terms; 3.7. Terms of publications (fee); 4. ARCHIV: 4.1. Previous issues; 4.2. Current issue; 4.3. Articles online first; 5. INSTRUCTIONS FOR AUTHORS: 5.1. General recommendations; 5.2. Manuscript templates; 5.3. Supplemental materials; 6. STATISTICS: 6.1. Publications; 6.2. Authors; 6.3. Readers; 7. CONTACTS: 7.1. Contact; 7.2. Subscriptions; 7.3. Search. Conclusions: This academic journal website model was implemented for the International Journal of Science Annals (IJSA). Authors and readers of IJSA noted the advantages of the model proposed by the author, including: a convenient and understandable website interface, the availability of the necessary hyperlinks to the pages of the journal's website and external media (sites of indexed agencies, library archives, etc.), convenient search for information on the website and published in the journal articles (by author, publication, text of the article), availability of integrated applications (online submission of manuscripts, filing appeals against the decision of reviewers and complaints about published articles, viewing the interactive printed version of the journal, etc.), availability of templates (for authors, reviewers), availability of multiple formats for archiving articles (PDF, DOAJ, XML, TXT), the ability to choose the style of citing the article and the website language (English, Ukrainian), etc. Keywords: journal, model, website, academic, indexing
Style APA, Harvard, Vancouver, ISO itp.
10

Choquette, Gary. PR-000-23COMP-R05 Pipe Wrinkles Comprehensive Compendia. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2023. http://dx.doi.org/10.55274/r0000020.

Pełny tekst źródła
Streszczenie:
This compendium is a selection of past PRCI research related to the formation and management of pipe with wrinkles. Metadata is provided for each resource (when available) including the length of the report, its abstract, author(s), and company that performed the research. The process of identifying reports for this compendium involved keyword searches of all PRCI research documents (and in some cases, research by others). The list of documents identified in that keyword match was then manually reviewed for relevance. Documents that had content that was not directly relevant to the topic of this compendium, had minimal information, or duplicated information were excluded. Specifically, this study reviewed 163 documents and only selected 61 documents that were deemed relevant. Key excerpts and/or notes were taken from those documents and are included here. In many cases, the excerpt/notes are adequate such that the source document does not need to be read separately. However, there are some documents that contain much more content than can be adequately summarized herein. In those cases, the note recommends reviewing that document in its entirety. Links to each of the reports are provided to help facilitate quick access to the related reports. A valid PRCI account is needed to access these links on the PRCI website. It is recommended that when logging onto PRCI's website, the 'keep me logged in' feature is enabled. Not all the links will be assessable to non-PRCI members.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii