Gotowa bibliografia na temat „Multi-access”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Multi-access”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Multi-access"
Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan i Onur Mutlu. "Simultaneous Multi-Layer Access". ACM Transactions on Architecture and Code Optimization 12, nr 4 (7.01.2016): 1–29. http://dx.doi.org/10.1145/2832911.
Pełny tekst źródłaAlderson, Priscilla, Mary Madden, Ann Oakley i Ruth Wilkins. "Access and multi-centre research". Monash Bioethics Review 14, nr 4 (październik 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.
Pełny tekst źródłaTatipally, Sampath Kumar, i Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31.10.2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.
Pełny tekst źródłaVaidya, Kanishak, i Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches". Entropy 25, nr 8 (18.08.2023): 1228. http://dx.doi.org/10.3390/e25081228.
Pełny tekst źródłaGelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero i Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks". Computer Networks 55, nr 1 (styczeń 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.
Pełny tekst źródłaKolyeva, Natalya. "Organization of multi-access in databases". E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.
Pełny tekst źródłaTanaka, Hiroyuki, Masahiro Yoshida, Koya Mori i Noriyuki Takahashi. "Multi-access Edge Computing: A Survey". Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.
Pełny tekst źródłaFilali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane i Mohsen Guizani. "Multi-Access Edge Computing: A Survey". IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.
Pełny tekst źródłaNewmann, Scott. "Multi-vendor interoperability through SQL access". ACM SIGMOD Record 21, nr 2 (czerwiec 1992): 414. http://dx.doi.org/10.1145/141484.130345.
Pełny tekst źródłaDua, Aditya. "Random Access with Multi-Packet Reception". IEEE Transactions on Wireless Communications 7, nr 6 (czerwiec 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.
Pełny tekst źródłaRozprawy doktorskie na temat "Multi-access"
Greaves, David J. "Multi-access metropolitan area networks". Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303053.
Pełny tekst źródłaShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Pełny tekst źródłaChoi, Byoung Jo. "Multi-carrier code division multiple access". Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394098.
Pełny tekst źródłaStirling-Gallacher, Richard. "Multi-carrier code division multiple access". Thesis, University of Edinburgh, 1997. http://hdl.handle.net/1842/13027.
Pełny tekst źródłaAthamnah, Malek. "ENABLING MULTI-PARTY COLLABORATIVE DATA ACCESS". Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/528695.
Pełny tekst źródłaPh.D.
Cloud computing has brought availability of services at unprecedented scales but data accessibility considerations become more complex due to involvement of multiple parties in providing the infrastructure. In this thesis, we discuss the problem of enabling cooperative data access in a multi-cloud environment where the data is owned and managed by multiple enterprises. We consider a multi-party collaboration scheme whereby a set of parties collectively decide accessibility to data from individual parties using different data models such as relational databases, and graph databases. In order to implement desired business services, parties need to share a selected portion of information with one another. We consider a model with a set of authorization rules over the joins of basic relations, and such rules are defined by these cooperating parties. The accessible information is constrained by these rules. Specifically, the following critical issues were examined: Combine rule enforcement and query planning and devise an algorithm which simultaneously checks for the enforceability of each rule and generation of minimum cost plan of its execution using a cost metric whenever the enforcement is possible; We also consider other forms of limiting the access to the shared data using safety properties and selection conditions. We proposed algorithms for both forms to remove any conflicts or violations between the limited accesses and model queries; Used graph databases with our authorization rules and query planning model to conduct similarity search between tuples, where we represent the relational database tuples as a graph with weighted edges, which enables queries involving "similarity" across the tuples. We proposed an algorithm to exploit the correlations between attributes to create virtual attributes that can be used to catch much of the data variance, and enhance the speed at which similarity search occurs; Proposed a framework for defining test functionalities their composition, and their access control. We discussed an algorithm to determine the realization of the given test via valid compositions of individual functionalities in a way to minimize the number of parties involved. The research significance resides in solving real-world issues that arise in using cloud services for enterprises After extensive evaluations, results revealed: collaborative data access model improves the security during cooperative data processes; systematic and efficient solving access rules conflict issues minimizes the possible data leakage; and, a systematic approach tackling control failure diagnosis helps reducing troubleshooting times and all that improve availability and resiliency. The study contributes to the knowledge, literature, and practice. This research opens up the space for further studies in various aspects of secure data cooperation in large-scale cyber and cyber-physical infrastructures.
Temple University--Theses
Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective". Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.
Pełny tekst źródłaGarnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.
Pełny tekst źródłaLarge data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, computational power spent on access control routines, procedures for administration and key distribution and availability of extension features needed in large scale data center scenarios. Our administration analysis will propose and present possible methods for initial key distribution to new machines in the data center, as well as methods for enrolling new users. We will also propose a method for automatic service instantiation in Kerberos and present a method for service instantiation in PKI. We will look at how the systems handle failed machines in the network, and look at how the systems handle breaches of trusted components. Our performance analysis will show that under given assumptions, both Kerberos and PKI will handle the average load in a hypothetical data center consisting of 100000 machines and 1000 users. We will also see that under an assumed peak load, Kerberos will be able to handle 10000 service requests in under 1 second, whereas the PKI solution would need at least 15 seconds to handle the same number of requests using recommended public key sizes. This means that some programs may need special configurations to work in a PKI system under high load.
羅福隆 i Fook-loong Lo. "Performance of multi-channel random access networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31236029.
Pełny tekst źródłaTelatar, Ä°brahim Emre. "Multi-access communications with decision feedback decoding". Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13237.
Pełny tekst źródłaIncludes bibliographical references (leaves 84-85) and index.
by Ä°brahim Emre Telatar.
Ph.D.
Yang, Xu. "Multi-channel Mobile Access to Web Services". Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30270.
Pełny tekst źródłaPh. D.
Książki na temat "Multi-access"
Center, Goddard Space Flight, red. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Znajdź pełny tekst źródłaCenter, Goddard Space Flight, red. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Znajdź pełny tekst źródłaCenter, Goddard Space Flight, red. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.
Znajdź pełny tekst źródłaAnastasopoulos, Achilles. Cross model access in the multi-lingual, multi-model database management system. Monterey, Calif: Naval Postgraduate School, 1997.
Znajdź pełny tekst źródłaGaffney, Kevin J. Techniques for multi-network access to multimedia messages. Dublin: University College Dublin, 1996.
Znajdź pełny tekst źródłaSabella, Dario. Multi-access Edge Computing: Software Development at the Network Edge. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79618-1.
Pełny tekst źródłaMores, Robert. Fibre-optic, multi-access network for intracar and manufacturing environments. Leicester: De Montfort University, 1994.
Znajdź pełny tekst źródłaMuntean, Gabriel-Miro, i Ramona Trestian. Wireless multi-access environments and quality of service provisioning: Solutions and application. Hershey PA: Information Science Reference, 2012.
Znajdź pełny tekst źródłaBartalesi-Graf, Daniela, i Colleen Ryan. Caleidoscopio with MyItalianLab (multi Semester Access) -- Access Card Package. Pearson Education, Limited, 2014.
Znajdź pełny tekst źródłaStelzer, Tim, i Paul A. Tipler. Tipler WebAssign Access Card & SmartPhysics Multi-Term Access Card. W. H. Freeman, 2012.
Znajdź pełny tekst źródłaCzęści książek na temat "Multi-access"
Shekhar, Shashi, i Hui Xiong. "Multi-Dimensional Access Structures". W Encyclopedia of GIS, 758. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_841.
Pełny tekst źródłaConforto, Paolo, i Clementina Tocci. "Multi-Segment Access Network". W Space/Terrestrial Mobile Networks, 13–45. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470021039.ch2.
Pełny tekst źródłaPrasad, Ramjee, Muhammad Imadur Rahman, Suvra Sekhar Das i Nicola Marchetti. "Multi-Carrier Based Access Techniques". W Single- And Multi-Carrier Mimo Transmission for Broadband Wireless Systems, 61–107. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339533-4.
Pełny tekst źródłaPark, Sun Rae, Jong Suk Ruth Lee, Kum Won Cho i Kyu-Chul Lee. "Multi-level Access Control for GeoContents". W Communications in Computer and Information Science, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-26010-0_22.
Pełny tekst źródłaShibao, Kazunori, Aiichiro Higure i Koji Yamaguchi. "Access Device 2: Multi-Channel Port". W Reduced Port Laparoscopic Surgery, 45–56. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_6.
Pełny tekst źródłaMorais, Douglas H. "Multi-carrier-Based Multiple-Access Techniques". W Key 5G Physical Layer Technologies, 129–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51441-9_7.
Pełny tekst źródłaShetty, Rajaneesh Sudhakar. "Multi-Access Edge Computing in 5G". W 5G Mobile Core Network, 69–102. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_2.
Pełny tekst źródłaMorais, Douglas H. "Multi-Carrier-Based Multiple-Access Techniques". W Key 5G Physical Layer Technologies, 143–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89209-8_7.
Pełny tekst źródłaAkman, Gizem, Philip Ginzboorg i Valtteri Niemi. "Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications". W Computational Science and Its Applications – ICCSA 2021, 44–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87010-2_4.
Pełny tekst źródłaChen, Ying, Ning Zhang, Yuan Wu i Sherman Shen. "Energy-Efficient Multi-Task Multi-Access Computation Offloading via NOMA". W Energy Efficient Computation Offloading in Mobile Edge Computing, 123–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16822-2_5.
Pełny tekst źródłaStreszczenia konferencji na temat "Multi-access"
Koudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs i H. Tang. "Access Flow based Multi-Radio Access Connectivity". W 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.
Pełny tekst źródłaSquicciarini, Anna Cinzia, Sarah Michele Rajtmajer i Nicola Zannone. "Multi-Party Access Control". W SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205977.3205999.
Pełny tekst źródłaVetter, P. "Multi service access everywhere". W 31st European Conference on Optical Communications (ECOC 2005). IEE, 2005. http://dx.doi.org/10.1049/cp:20050833.
Pełny tekst źródłaJorguseski, Ljupco, Remco Litjens, Chen Zhiyi i Homayon Nikookar. "Radio Access Selection in Multi-Radio Access Systems". W 2007 14th IEEE Symposium on Communications and Vehicular Technology in the Benelux. IEEE, 2007. http://dx.doi.org/10.1109/scvt.2007.4436230.
Pełny tekst źródłaRad, A. Hamed Mohsenian, i Vincent W. S. Wong. "Distributed Multi-Interface Multi-Channel Random Access". W IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.1033.
Pełny tekst źródłade Sousa, V. A., R. A. de O. Neto, F. de S. Chaves, L. S. Cardoso i F. R. P. Cavalcanti. "Access selection with connection reallocation for multi-access networks". W ITS '07. 2007 International Telecommunications Symposium. IEEE, 2006. http://dx.doi.org/10.1109/its.2006.4433347.
Pełny tekst źródłaSachs, J., R. Aguero, M. Berg, J. Gebert, L. Jorguseski, I. Karla, P. Karlsson i in. "Migration of Existing Access Networks Towards Multi-Radio Access". W IEEE Vehicular Technology Conference. IEEE, 2006. http://dx.doi.org/10.1109/vtcf.2006.616.
Pełny tekst źródłaWang, Lei, Haizhou Wang, Xue Jiang, Jingwu Cui i Baoyu Zheng. "Multi-Access Edge Computing using Mode Division Multiple Access". W 2022 14th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2022. http://dx.doi.org/10.1109/wcsp55476.2022.10039371.
Pełny tekst źródłaYaish, Haitham, i Madhu Goyal. "Multi-tenant Database Access Control". W 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.131.
Pełny tekst źródłaNzomo, Peggy, Victoria L. Rubin i Isola Ajiferuke. "Multi-lingual information access tools". W the 2012 iConference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2132176.2132276.
Pełny tekst źródłaRaporty organizacyjne na temat "Multi-access"
Kanugovi, S., F. Baboescu, J. Zhu i S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, marzec 2020. http://dx.doi.org/10.17487/rfc8743.
Pełny tekst źródłaZhu, J., i S. Kanugovi. Generic Multi-Access (GMA) Encapsulation Protocol. RFC Editor, luty 2022. http://dx.doi.org/10.17487/rfc9188.
Pełny tekst źródłaMaggio, Gian M., David Laney i Lawrence Larson. BER and Error-Floor Calculation for Multi-Access PCTH. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada414339.
Pełny tekst źródłaKondi, Lisimachos P. Scalable Video Transmission Over Multi-Rate Multiple Access Channels. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2007. http://dx.doi.org/10.21236/ada470529.
Pełny tekst źródłaLiu, Keqin, i Qing Zhao. Link Throughput of Multi-Channel Opportunistic Access with Limited Sensing. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2007. http://dx.doi.org/10.21236/ada575936.
Pełny tekst źródłaMelia, T., i S. Gundavelli, red. Logical-Interface Support for IP Hosts with Multi-Access Support. RFC Editor, maj 2016. http://dx.doi.org/10.17487/rfc7847.
Pełny tekst źródłaKazakos, D., i I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, luty 1987. http://dx.doi.org/10.21236/ada186041.
Pełny tekst źródłaZeger, Linda, i Amanda Peters. Efficient Methods for Broadcasting Multi-Slot Messages with Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2011. http://dx.doi.org/10.21236/ada570576.
Pełny tekst źródłaPeters, Amanda, i Linda Zeger. Efficient Resource Allocation for Broadcasting Multi-Slot Messages With Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, marzec 2011. http://dx.doi.org/10.21236/ada541058.
Pełny tekst źródłaOoghe, S., N. Voigt, M. Platnic, T. Haag i S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, maj 2010. http://dx.doi.org/10.17487/rfc5851.
Pełny tekst źródła