Gotowa bibliografia na temat „Multi-access”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Multi-access”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Multi-access"

1

Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan i Onur Mutlu. "Simultaneous Multi-Layer Access". ACM Transactions on Architecture and Code Optimization 12, nr 4 (7.01.2016): 1–29. http://dx.doi.org/10.1145/2832911.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Alderson, Priscilla, Mary Madden, Ann Oakley i Ruth Wilkins. "Access and multi-centre research". Monash Bioethics Review 14, nr 4 (październik 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tatipally, Sampath Kumar, i Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31.10.2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Vaidya, Kanishak, i Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches". Entropy 25, nr 8 (18.08.2023): 1228. http://dx.doi.org/10.3390/e25081228.

Pełny tekst źródła
Streszczenie:
We consider the problem of multi-access cache-aided multi-user Private Information Retrieval (MACAMuPIR) with cyclic wraparound cache access. In MACAMuPIR, several files are replicated across multiple servers. There are multiple users and multiple cache nodes. When the network is not congested, servers fill these cache nodes with the content of the files. During peak network traffic, each user accesses several cache nodes. Every user wants to retrieve one file from the servers but does not want the servers to know their demands. This paper proposes a private retrieval scheme for MACAMuPIR and characterizes the transmission cost for multi-access systems with cyclic wraparound cache access. We formalize privacy and correctness constraints and analyze transmission costs. The scheme outperforms the previously known dedicated cache setup, offering efficient and private retrieval. Results demonstrate the effectiveness of the multi-access approach. Our research contributes an efficient, privacy-preserving solution for multi-user PIR, advancing secure data retrieval from distributed servers.
Style APA, Harvard, Vancouver, ISO itp.
5

Gelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero i Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks". Computer Networks 55, nr 1 (styczeń 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kolyeva, Natalya. "Organization of multi-access in databases". E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.

Pełny tekst źródła
Streszczenie:
A particular, but important problem of freeing database memory in multi-access conditions is considered. A number of solutions to this problem are proposed and their advantages and disadvantages are noted. Three methods of organizing work with free space are considered. The first method assumes two additional modes of capturing pages: “Joint deletion” and “deletion”. In the second method, the pages after the last tuple have been deleted are inserted at the end of the free list. The third method involves the actual presentation of the freed pages of the relationship to the free memory pool of the segment and is postponed until the relationship is reorganized.
Style APA, Harvard, Vancouver, ISO itp.
7

Tanaka, Hiroyuki, Masahiro Yoshida, Koya Mori i Noriyuki Takahashi. "Multi-access Edge Computing: A Survey". Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Filali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane i Mohsen Guizani. "Multi-Access Edge Computing: A Survey". IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Newmann, Scott. "Multi-vendor interoperability through SQL access". ACM SIGMOD Record 21, nr 2 (czerwiec 1992): 414. http://dx.doi.org/10.1145/141484.130345.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dua, Aditya. "Random Access with Multi-Packet Reception". IEEE Transactions on Wireless Communications 7, nr 6 (czerwiec 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Multi-access"

1

Greaves, David J. "Multi-access metropolitan area networks". Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303053.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Shaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.

Pełny tekst źródła
Streszczenie:
The primary focus of this research is an examination of the issues involved in the granting of access in an environment characterised by multiple users, multiple resources and multiple levels of access permission. Increasing levels of complexity in automotive systems provides opportunities for improving the integration and efficiency of the services provided to the operator. The vehicle lease / hire environment provided a basis for evaluating conditional access to distributed, mobile assets where the principal medium for operating in this environment is the Smart Card. The application of Smart Cards to existing vehicle management systems requires control of access to motor vehicles, control of vehicle operating parameters and secure storage of operating information. The issues addressed include examination of the characteristics of the operating environment, development of a model and design, simulation and evaluation of a multiple application Smart Card. The functions provided by the card include identification and authentication, secure hash and encryption functions which may be applied, in general, to a wide range of access problems. Evaluation of the algorithms implemented indicate that the Smart Card design may be provably secure under single use conditions and conditionally secure under multiple use conditions. The simulation of the card design provided data to support further research and shows the design is practical and able to be implemented on current Smart Card types.
Style APA, Harvard, Vancouver, ISO itp.
3

Choi, Byoung Jo. "Multi-carrier code division multiple access". Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394098.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Stirling-Gallacher, Richard. "Multi-carrier code division multiple access". Thesis, University of Edinburgh, 1997. http://hdl.handle.net/1842/13027.

Pełny tekst źródła
Streszczenie:
The topic of this thesis is the use of multi-carrier modulation with code division multiple access (CDMA). The motivation of this work is to establish if the combination of multi-carrier modulation with CDMA has a performance advantage over a conventional direct sequence CDMA (DS-CDMA) communication system. In this thesis three types of multi-carrier CDMA are identified and the main work is concentrated on one particular combination, which is referred to as one chip per carrier multi-carrier CDMA system. This system itself, however can be split into different variations and an examination of two of these is made. The first of these one chip per carrier multi-carrier CDMA systems utilises the same number of carriers as the spreading sequence length. The carriers overlap and adjacent chips of the spreading sequence modulate adjacent carriers. There is no guard interval and therefore intercarrier interference occurs. If the receiver is synchronised and has a perfect estimate of the channel, it is shown that this multi-carrier CDMA system has comparable performance to a DS-CDMA system of the same bandwidth. It is further shown that it is simple to compute the minimum mean square error criteria as the equaliser consists of N one tap equalisers, where N is the number of carriers. The second system utilises many overlapping low data rate orthogonal carriers. The orthogonality of the carriers is maintained due to cyclically extended guard interval and the number of carriers is much higher than the spreading sequence length. After spreading, the data streams are interleaved onto the carriers to maximise diversity. A practical form of maximum likelihood detection for 64 users is described. It is shown from simulation results that when the system is used in conjunction with ½ rate (constraint length 7) coding and equal gain combining the system can support 64 users at 6 dB E6/N6 for a bit error rate of 2 x 10-3. This compares with an equivalent DS-CDMA system which can only support 16 users for the same bit error rate and E6/No. These results assume perfect channel knowledge and synchronisation. It is further shown that to provide high spectral efficiency in a coded system a high rate convolutional coding scheme is needed. A combined decoder/canceller is also presented. Finally, techniques to achieve synchronisation and channel estimation algorithms are presented. These algorithms are considered in conjunction with the second system. In the framework of synchronisation, methods are presented for frequency and timing synchronisation. For channel estimation, simulation results are presented for a simple channel estimator.
Style APA, Harvard, Vancouver, ISO itp.
5

Athamnah, Malek. "ENABLING MULTI-PARTY COLLABORATIVE DATA ACCESS". Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/528695.

Pełny tekst źródła
Streszczenie:
Computer and Information Science
Ph.D.
Cloud computing has brought availability of services at unprecedented scales but data accessibility considerations become more complex due to involvement of multiple parties in providing the infrastructure. In this thesis, we discuss the problem of enabling cooperative data access in a multi-cloud environment where the data is owned and managed by multiple enterprises. We consider a multi-party collaboration scheme whereby a set of parties collectively decide accessibility to data from individual parties using different data models such as relational databases, and graph databases. In order to implement desired business services, parties need to share a selected portion of information with one another. We consider a model with a set of authorization rules over the joins of basic relations, and such rules are defined by these cooperating parties. The accessible information is constrained by these rules. Specifically, the following critical issues were examined: Combine rule enforcement and query planning and devise an algorithm which simultaneously checks for the enforceability of each rule and generation of minimum cost plan of its execution using a cost metric whenever the enforcement is possible; We also consider other forms of limiting the access to the shared data using safety properties and selection conditions. We proposed algorithms for both forms to remove any conflicts or violations between the limited accesses and model queries; Used graph databases with our authorization rules and query planning model to conduct similarity search between tuples, where we represent the relational database tuples as a graph with weighted edges, which enables queries involving "similarity" across the tuples. We proposed an algorithm to exploit the correlations between attributes to create virtual attributes that can be used to catch much of the data variance, and enhance the speed at which similarity search occurs; Proposed a framework for defining test functionalities their composition, and their access control. We discussed an algorithm to determine the realization of the given test via valid compositions of individual functionalities in a way to minimize the number of parties involved. The research significance resides in solving real-world issues that arise in using cloud services for enterprises After extensive evaluations, results revealed: collaborative data access model improves the security during cooperative data processes; systematic and efficient solving access rules conflict issues minimizes the possible data leakage; and, a systematic approach tackling control failure diagnosis helps reducing troubleshooting times and all that improve availability and resiliency. The study contributes to the knowledge, literature, and practice. This research opens up the space for further studies in various aspects of secure data cooperation in large-scale cyber and cyber-physical infrastructures.
Temple University--Theses
Style APA, Harvard, Vancouver, ISO itp.
6

Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective". Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.

Pełny tekst źródła
Streszczenie:
In the thesis, we address the fundamental problem of opportunistic spectrum access in a multi-channel communication system. Specifically, we consider a communication system in which a user has access to multiple channels, but is limited to sensing and transmitting only on one at a given time. We explore how the smart user should exploit past observations and the knowledge of the stochastic properties of these channels to maximize its transmission rate by switching channels opportunistically. Formally, we provide a generic analysis on the opportunistic spectrum access problem by casting the problem into the restless multi-armed bandit (RMAB) problem, one of the most well-known generalizations of the classic multi-armed bandit (MAB) problem, which is of fundamental importance in stochastic decision theory. Despite the significant research efforts in the field, the RMAB problem in its generic form still remains open. Until today, very little result is reported on the structure of the optimal policy. Obtaining the optimal policy for a general RMAB problem is often intractable due to the exponential computation complexity. Hence, a natural alternative is to seek a simple myopic policy maximizing the short-term reward. Therefore, we develop three axioms characterizing a family of functions which we refer to as regular functions, which are generic and practically important. We then establish the optimality of the myopic policy when the reward function can be expressed as a regular function and the discount factor is bounded by a closed-form threshold determined by the reward function. We also illustrate how the derived results, generic in nature, are applied to analyze a class of RMAB problems arising from multi-channel opportunistic access. Next, we further investigate the more challenging problem where the user has to decide the number of channels to sense in each slot in order to maximize its utility (e.g., throughput). After showing the exponential complexity of the problem, we develop a heuristic v-step look-ahead strategy. In the developed strategy, the parameter v allows to achieve a desired tradeoff between social efficiency and computation complexity. We demonstrate the benefits of the proposed strategy via numerical experiments on several typical settings.
Style APA, Harvard, Vancouver, ISO itp.
7

Garnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.

Pełny tekst źródła
Streszczenie:

Large data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, computational power spent on access control routines, procedures for administration and key distribution and availability of extension features needed in large scale data center scenarios. Our administration analysis will propose and present possible methods for initial key distribution to new machines in the data center, as well as methods for enrolling new users. We will also propose a method for automatic service instantiation in Kerberos and present a method for service instantiation in PKI. We will look at how the systems handle failed machines in the network, and look at how the systems handle breaches of trusted components. Our performance analysis will show that under given assumptions, both Kerberos and PKI will handle the average load in a hypothetical data center consisting of 100000 machines and 1000 users. We will also see that under an assumed peak load, Kerberos will be able to handle 10000 service requests in under 1 second, whereas the PKI solution would need at least 15 seconds to handle the same number of requests using recommended public key sizes. This means that some programs may need special configurations to work in a PKI system under high load.

Style APA, Harvard, Vancouver, ISO itp.
8

羅福隆 i Fook-loong Lo. "Performance of multi-channel random access networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31236029.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Telatar, Ä°brahim Emre. "Multi-access communications with decision feedback decoding". Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13237.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1992.
Includes bibliographical references (leaves 84-85) and index.
by Ä°brahim Emre Telatar.
Ph.D.
Style APA, Harvard, Vancouver, ISO itp.
10

Yang, Xu. "Multi-channel Mobile Access to Web Services". Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30270.

Pełny tekst źródła
Streszczenie:
To support wireless-oriented services, a new generation of Web services called Mobile services (M-services) has emerged. M-services provide mobile users access to services through wireless networks. One of the important issues in M-service environment is how to discover and access M-services efficiently. In this dissertation, we propose time and power efficient access methods for M-services. We focus on methods for accessing broadcast based M-services from multiple wireless channels. We first discuss efficient access methods in data-oriented wireless broadcast systems. We then discuss how to extend current wireless broadcast systems to support simple M-services. We present a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Multi-channel algorithms are proposed for efficiently accessing composite services. We define a few semantics that have impact on access efficiency in the proposed infrastructure. We discuss semantic access to composite services. Broadcast channel organizations suitable for discovering and accessing composite services are proposed. We also derive analytical models for these channel organizations. To provide practical study for the proposed infrastructure and access methods, a testbed is developed for simulating accessing M-services in a broadcast-based environment. Extensive experiments have been conducted to study the proposed access methods and broadcast channel organizations. The experimental results are presented and discussed.
Ph. D.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Multi-access"

1

Center, Goddard Space Flight, red. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Center, Goddard Space Flight, red. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Center, Goddard Space Flight, red. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Anastasopoulos, Achilles. Cross model access in the multi-lingual, multi-model database management system. Monterey, Calif: Naval Postgraduate School, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Gaffney, Kevin J. Techniques for multi-network access to multimedia messages. Dublin: University College Dublin, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Sabella, Dario. Multi-access Edge Computing: Software Development at the Network Edge. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79618-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Mores, Robert. Fibre-optic, multi-access network for intracar and manufacturing environments. Leicester: De Montfort University, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Muntean, Gabriel-Miro, i Ramona Trestian. Wireless multi-access environments and quality of service provisioning: Solutions and application. Hershey PA: Information Science Reference, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bartalesi-Graf, Daniela, i Colleen Ryan. Caleidoscopio with MyItalianLab (multi Semester Access) -- Access Card Package. Pearson Education, Limited, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Stelzer, Tim, i Paul A. Tipler. Tipler WebAssign Access Card & SmartPhysics Multi-Term Access Card. W. H. Freeman, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Multi-access"

1

Shekhar, Shashi, i Hui Xiong. "Multi-Dimensional Access Structures". W Encyclopedia of GIS, 758. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_841.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Conforto, Paolo, i Clementina Tocci. "Multi-Segment Access Network". W Space/Terrestrial Mobile Networks, 13–45. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470021039.ch2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Prasad, Ramjee, Muhammad Imadur Rahman, Suvra Sekhar Das i Nicola Marchetti. "Multi-Carrier Based Access Techniques". W Single- And Multi-Carrier Mimo Transmission for Broadband Wireless Systems, 61–107. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339533-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Park, Sun Rae, Jong Suk Ruth Lee, Kum Won Cho i Kyu-Chul Lee. "Multi-level Access Control for GeoContents". W Communications in Computer and Information Science, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-26010-0_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Shibao, Kazunori, Aiichiro Higure i Koji Yamaguchi. "Access Device 2: Multi-Channel Port". W Reduced Port Laparoscopic Surgery, 45–56. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Morais, Douglas H. "Multi-carrier-Based Multiple-Access Techniques". W Key 5G Physical Layer Technologies, 129–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51441-9_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shetty, Rajaneesh Sudhakar. "Multi-Access Edge Computing in 5G". W 5G Mobile Core Network, 69–102. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Morais, Douglas H. "Multi-Carrier-Based Multiple-Access Techniques". W Key 5G Physical Layer Technologies, 143–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89209-8_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Akman, Gizem, Philip Ginzboorg i Valtteri Niemi. "Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications". W Computational Science and Its Applications – ICCSA 2021, 44–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87010-2_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chen, Ying, Ning Zhang, Yuan Wu i Sherman Shen. "Energy-Efficient Multi-Task Multi-Access Computation Offloading via NOMA". W Energy Efficient Computation Offloading in Mobile Edge Computing, 123–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16822-2_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Multi-access"

1

Koudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs i H. Tang. "Access Flow based Multi-Radio Access Connectivity". W 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Squicciarini, Anna Cinzia, Sarah Michele Rajtmajer i Nicola Zannone. "Multi-Party Access Control". W SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205977.3205999.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Vetter, P. "Multi service access everywhere". W 31st European Conference on Optical Communications (ECOC 2005). IEE, 2005. http://dx.doi.org/10.1049/cp:20050833.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jorguseski, Ljupco, Remco Litjens, Chen Zhiyi i Homayon Nikookar. "Radio Access Selection in Multi-Radio Access Systems". W 2007 14th IEEE Symposium on Communications and Vehicular Technology in the Benelux. IEEE, 2007. http://dx.doi.org/10.1109/scvt.2007.4436230.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rad, A. Hamed Mohsenian, i Vincent W. S. Wong. "Distributed Multi-Interface Multi-Channel Random Access". W IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.1033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

de Sousa, V. A., R. A. de O. Neto, F. de S. Chaves, L. S. Cardoso i F. R. P. Cavalcanti. "Access selection with connection reallocation for multi-access networks". W ITS '07. 2007 International Telecommunications Symposium. IEEE, 2006. http://dx.doi.org/10.1109/its.2006.4433347.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sachs, J., R. Aguero, M. Berg, J. Gebert, L. Jorguseski, I. Karla, P. Karlsson i in. "Migration of Existing Access Networks Towards Multi-Radio Access". W IEEE Vehicular Technology Conference. IEEE, 2006. http://dx.doi.org/10.1109/vtcf.2006.616.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wang, Lei, Haizhou Wang, Xue Jiang, Jingwu Cui i Baoyu Zheng. "Multi-Access Edge Computing using Mode Division Multiple Access". W 2022 14th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2022. http://dx.doi.org/10.1109/wcsp55476.2022.10039371.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Yaish, Haitham, i Madhu Goyal. "Multi-tenant Database Access Control". W 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.131.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nzomo, Peggy, Victoria L. Rubin i Isola Ajiferuke. "Multi-lingual information access tools". W the 2012 iConference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2132176.2132276.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Multi-access"

1

Kanugovi, S., F. Baboescu, J. Zhu i S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, marzec 2020. http://dx.doi.org/10.17487/rfc8743.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zhu, J., i S. Kanugovi. Generic Multi-Access (GMA) Encapsulation Protocol. RFC Editor, luty 2022. http://dx.doi.org/10.17487/rfc9188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Maggio, Gian M., David Laney i Lawrence Larson. BER and Error-Floor Calculation for Multi-Access PCTH. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada414339.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kondi, Lisimachos P. Scalable Video Transmission Over Multi-Rate Multiple Access Channels. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2007. http://dx.doi.org/10.21236/ada470529.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Keqin, i Qing Zhao. Link Throughput of Multi-Channel Opportunistic Access with Limited Sensing. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2007. http://dx.doi.org/10.21236/ada575936.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Melia, T., i S. Gundavelli, red. Logical-Interface Support for IP Hosts with Multi-Access Support. RFC Editor, maj 2016. http://dx.doi.org/10.17487/rfc7847.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kazakos, D., i I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, luty 1987. http://dx.doi.org/10.21236/ada186041.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zeger, Linda, i Amanda Peters. Efficient Methods for Broadcasting Multi-Slot Messages with Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2011. http://dx.doi.org/10.21236/ada570576.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Peters, Amanda, i Linda Zeger. Efficient Resource Allocation for Broadcasting Multi-Slot Messages With Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, marzec 2011. http://dx.doi.org/10.21236/ada541058.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Ooghe, S., N. Voigt, M. Platnic, T. Haag i S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, maj 2010. http://dx.doi.org/10.17487/rfc5851.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii