Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Multi-access.

Artykuły w czasopismach na temat „Multi-access”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Multi-access”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan i Onur Mutlu. "Simultaneous Multi-Layer Access". ACM Transactions on Architecture and Code Optimization 12, nr 4 (7.01.2016): 1–29. http://dx.doi.org/10.1145/2832911.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Alderson, Priscilla, Mary Madden, Ann Oakley i Ruth Wilkins. "Access and multi-centre research". Monash Bioethics Review 14, nr 4 (październik 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tatipally, Sampath Kumar, i Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31.10.2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Vaidya, Kanishak, i Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches". Entropy 25, nr 8 (18.08.2023): 1228. http://dx.doi.org/10.3390/e25081228.

Pełny tekst źródła
Streszczenie:
We consider the problem of multi-access cache-aided multi-user Private Information Retrieval (MACAMuPIR) with cyclic wraparound cache access. In MACAMuPIR, several files are replicated across multiple servers. There are multiple users and multiple cache nodes. When the network is not congested, servers fill these cache nodes with the content of the files. During peak network traffic, each user accesses several cache nodes. Every user wants to retrieve one file from the servers but does not want the servers to know their demands. This paper proposes a private retrieval scheme for MACAMuPIR and characterizes the transmission cost for multi-access systems with cyclic wraparound cache access. We formalize privacy and correctness constraints and analyze transmission costs. The scheme outperforms the previously known dedicated cache setup, offering efficient and private retrieval. Results demonstrate the effectiveness of the multi-access approach. Our research contributes an efficient, privacy-preserving solution for multi-user PIR, advancing secure data retrieval from distributed servers.
Style APA, Harvard, Vancouver, ISO itp.
5

Gelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero i Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks". Computer Networks 55, nr 1 (styczeń 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kolyeva, Natalya. "Organization of multi-access in databases". E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.

Pełny tekst źródła
Streszczenie:
A particular, but important problem of freeing database memory in multi-access conditions is considered. A number of solutions to this problem are proposed and their advantages and disadvantages are noted. Three methods of organizing work with free space are considered. The first method assumes two additional modes of capturing pages: “Joint deletion” and “deletion”. In the second method, the pages after the last tuple have been deleted are inserted at the end of the free list. The third method involves the actual presentation of the freed pages of the relationship to the free memory pool of the segment and is postponed until the relationship is reorganized.
Style APA, Harvard, Vancouver, ISO itp.
7

Tanaka, Hiroyuki, Masahiro Yoshida, Koya Mori i Noriyuki Takahashi. "Multi-access Edge Computing: A Survey". Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Filali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane i Mohsen Guizani. "Multi-Access Edge Computing: A Survey". IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Newmann, Scott. "Multi-vendor interoperability through SQL access". ACM SIGMOD Record 21, nr 2 (czerwiec 1992): 414. http://dx.doi.org/10.1145/141484.130345.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dua, Aditya. "Random Access with Multi-Packet Reception". IEEE Transactions on Wireless Communications 7, nr 6 (czerwiec 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Sachs, Joachim, Mikael Prytz i Jens Gebert. "Multi-access Management in Heterogeneous Networks". Wireless Personal Communications 48, nr 1 (24.11.2007): 7–32. http://dx.doi.org/10.1007/s11277-007-9431-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Altuntaş, Süleyman, i Buyurman Baykal. "Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks". Computer Networks 47, nr 4 (marzec 2005): 577–92. http://dx.doi.org/10.1016/j.comnet.2004.03.036.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Davidson, I. J. A. "Access Centrale?: Access Clinic. Access Decisions and the Multi-Disciplinary Care Our Patients Deserve". Journal of Vascular Access 7, nr 4 (październik 2006): 235–38. http://dx.doi.org/10.1177/112972980600700461.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Sachs, Joachim, i Per Magnusson. "Assessment of the access selection gain in multi-radio access networks". European Transactions on Telecommunications 20, nr 3 (kwiecień 2009): 265–79. http://dx.doi.org/10.1002/ett.1254.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Albonda, Haider D., i Sufian Yousef. "Multi-carrier coded division multiple access multiplexing against multi-path fading". International Journal of Electronic Security and Digital Forensics 6, nr 2 (2014): 140. http://dx.doi.org/10.1504/ijesdf.2014.063111.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

AbdulKadhim, Noor, i Mouiad Al-Wahah. "Semantic-Based Multi-Domain Data Access Authorization". Journal of Physics: Conference Series 1818, nr 1 (1.03.2021): 012211. http://dx.doi.org/10.1088/1742-6596/1818/1/012211.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Lee, Hai-Wu. "Design of Multi-Functional Access Control System". IEEE Access 9 (2021): 85255–64. http://dx.doi.org/10.1109/access.2021.3087917.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Mishra, Shailendra, i D. S. Chauhan. "Resource Allocation for Multi Access MIMO Systems". International Journal of Mobile Computing and Multimedia Communications 3, nr 3 (lipiec 2011): 36–50. http://dx.doi.org/10.4018/jmcmc.2011070103.

Pełny tekst źródła
Streszczenie:
In this paper, the authors discuss the emergence of new technologies related to the topic of the high-speed packet data access in wireless networks. The authors propose an algorithm for MIMO systems that optimizes the number of the transmit antennas according to the user’s QoS. Scheduling performance under two types of traffic modes is also discussed: one is voice or web-browsing and the other is for data transfer and streaming data.
Style APA, Harvard, Vancouver, ISO itp.
19

Wu, Fangzhou, Li Chen, Nan Zhao, Yunfei Chen, F. Richard Yu i Guo Wei. "NOMA-Enhanced Computation Over Multi-Access Channels". IEEE Transactions on Wireless Communications 19, nr 4 (kwiecień 2020): 2252–67. http://dx.doi.org/10.1109/twc.2019.2963654.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Sarakis, Lambros, George Kormentzas i Francisco Moya Guirao. "Seamless service provision for multi heterogeneous access". IEEE Wireless Communications 16, nr 5 (październik 2009): 32–40. http://dx.doi.org/10.1109/mwc.2009.5300300.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Kolsi, Nader, Abdelaziz Abdellatif i Khaled Ghedira. "Data warehouse access using multi-agent system". Distributed and Parallel Databases 25, nr 1-2 (21.02.2009): 29–45. http://dx.doi.org/10.1007/s10619-009-7036-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Robson, J. M. "Random access machines with multi-dimensional memories". Information Processing Letters 34, nr 5 (maj 1990): 265–66. http://dx.doi.org/10.1016/0020-0190(90)90133-i.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Steinkoenig, Jan, Resat Aksakal i Filip Du Prez. "Molecular access to multi-dimensionally encoded information". European Polymer Journal 120 (listopad 2019): 109260. http://dx.doi.org/10.1016/j.eurpolymj.2019.109260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Berendt, Annelise. "The changing landscape for multi access portals". Business Information Review 19, nr 2 (czerwiec 2002): 21–29. http://dx.doi.org/10.1177/026638202321036204.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Tan, Mizhou, Pingping Zong i Yeheskel Bar-Ness. "Multi-Rate Access Schemes for MC-CDMA". Wireless Personal Communications 27, nr 2 (listopad 2003): 149–82. http://dx.doi.org/10.1023/b:wire.0000003835.59701.43.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Abrantes, Filipe, i Manuel Ricardo. "XCP for shared-access multi-rate media". ACM SIGCOMM Computer Communication Review 36, nr 3 (5.07.2006): 27–38. http://dx.doi.org/10.1145/1140086.1140091.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Antony Franklin, A., i Supriya Dilip Tambe. "Multi-access edge computing in cellular networks". CSI Transactions on ICT 8, nr 1 (marzec 2020): 85–92. http://dx.doi.org/10.1007/s40012-020-00276-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Malamas, Vangelis, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester i Dimitris Glynos. "Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments". Applied Sciences 13, nr 1 (31.12.2022): 566. http://dx.doi.org/10.3390/app13010566.

Pełny tekst źródła
Streszczenie:
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open challenge. We present HMBAC, a distributed fine-grained access control model for shared and dynamic multi-authority and multi-domain environments, along with Janus, a practical system for HMBAC policy enforcement. The proposed HMBAC model supports: (a) dynamic trust management between different authorities; (b) flexible access control policy enforcement, defined at the domain and cross-domain level; (c) a global source of truth for all entities, supported by an immutable, audit-friendly mechanism. Janus implements the HMBAC model and relies on the effective fusion of two core components. First, a Hierarchical Multi-Blockchain architecture that acts as a single access point that cannot be bypassed by users or authorities. Second, a Multi-Authority Attribute-Based Encryption protocol that supports flexible shared multi-owner encryption, where attribute keys from different authorities are combined to decrypt data distributedly stored in different authorities. Our approach was implemented using Hyperledger Fabric as the underlying blockchain, with the system components placed in Kubernetes Docker container pods. We experimentally validated the effectiveness and efficiency of Janus, while fully reproducible artifacts of both our implementation and our measurements are provided.
Style APA, Harvard, Vancouver, ISO itp.
29

Hosono, Kohei, Akihiko Maki, Yousuke Watanabe, Hiroaki Takada i Kenya Sato. "Efficient Access Method for Multi-access Edge Servers in Dynamic Map Systems". International Journal of Intelligent Transportation Systems Research 20, nr 1 (24.01.2022): 252–65. http://dx.doi.org/10.1007/s13177-021-00289-8.

Pełny tekst źródła
Streszczenie:
AbstractResearch and development on connected cars equipped with communication functions is being conducted, and dynamic maps are being researched and developed as an information and communication platform for cooperative automatic driving. There is a concern about scalability when dynamic maps are constructed on a cloud server to aggregate a wide range of vehicle information. The problem can be alleviated by deploying edge servers that divide the geographic area where vehicles travel and manage each of them. The IP addresses of the edge servers need to be resolved on the basis of the location information of the moving vehicles. Using TCP improves reliability but reduces efficiency because the vehicles move. In this study, we developed a novel method for accessing edge servers that achieves higher reliability and efficiency by adopting UDP using anycast for transmission from vehicle to edge server and implementing a retransmission function. The effectiveness of this access method was verified by using a vehicle driving simulation.
Style APA, Harvard, Vancouver, ISO itp.
30

Mennes, Ruben, Felipe A. P. De Figueiredo i Steven Latre. "Multi-Agent Deep Learning for Multi-Channel Access in Slotted Wireless Networks". IEEE Access 8 (2020): 95032–45. http://dx.doi.org/10.1109/access.2020.2995456.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Aghamir, Seyed Mohammad Kazem, Reza Heidari, Seyedehsara Bayesh, Alborz Salavati i Reza Elmimehr. "Are Nephrostomy and Ureteral Stent Necessary after Multi-Access Percutaneous Nephrolithotomy?" Current Urology 13, nr 3 (2019): 141–44. http://dx.doi.org/10.1159/000499279.

Pełny tekst źródła
Streszczenie:
Introduction: Totally tubeless percutaneous nephrolithotomy (PCNL) is a well-established technique used in single -access procedure nevertheless these results challenge the multi-access PCNL as a contra-indication to application of this technique. Aims: To compare complication rates and safety of use of this technique after multi-access PCNL. Methods: A Total of 130 patients with renal stones were enrolled in this cohort study. Totally tubeless PCNL with single access (Group A, n = 70) and multi-access (Group B, n = 60) were done and bleedings were assessed by measuring hemoglobin (Hb) drop, blood transfusion rate and need for angioembolization besides leakage rates which were also recorded. Results: In the 130 patients who underwent totally tubeless PCNL, no leakage from puncture site nor angioembolization cases were identified. There was no significant statistical differences between 2 groups regarding Hb drop (1.91 in single access versus 2.20 in multi-access), transfusion rate and length of hospital stay (p > 0.05). Stone-free rate was increased from 91% in single access to 97% in multi access by adding percutaneous access sites (from 91% in single access to 97% in multi-access). Conclusions: Multi-access totally tubeless PCNL seems feasible and has comparable complication rates including Hb drop besides providing the advantage of higher stone-free rates using multi-access tracts.
Style APA, Harvard, Vancouver, ISO itp.
32

DONG Xiao-qing, 董晓庆, 程良伦 CHENG Liang-lun, 陈洪财 CHEN Hong-cai, 郑耿忠 ZHENG Geng-zhong i 谢森林 XIE Sen-lin. "Multi-objective optimization control method for multi-user multi-service access in heterogeneous wireless networks". Chinese Journal of Liquid Crystals and Displays 34, nr 7 (2019): 708–15. http://dx.doi.org/10.3788/yjyxs20193407.0708.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Kapadia, Percy, i Boon-Chong Seet. "Multi-Tier Cellular Handover with Multi-Access Edge Computing and Deep Learning". Telecom 2, nr 4 (15.11.2021): 446–71. http://dx.doi.org/10.3390/telecom2040026.

Pełny tekst źródła
Streszczenie:
This paper proposes a potential enhancement of handover for the next-generation multi-tier cellular network, utilizing two fifth-generation (5G) enabling technologies: multi-access edge computing (MEC) and machine learning (ML). MEC and ML techniques are the primary enablers for enhanced mobile broadband (eMBB) and ultra-reliable and low latency communication (URLLC). The subset of ML chosen for this research is deep learning (DL), as it is adept at learning long-term dependencies. A variant of artificial neural networks called a long short-term memory (LSTM) network is used in conjunction with a look-up table (LUT) as part of the proposed solution. Subsequently, edge computing virtualization methods are utilized to reduce handover latency and increase the overall throughput of the network. A realistic simulation of the proposed solution in a multi-tier 5G radio access network (RAN) showed a 40–60% improvement in overall throughput. Although the proposed scheme may increase the number of handovers, it is effective in reducing the handover failure (HOF) and ping-pong rates by 30% and 86%, respectively, compared to the current 3GPP scheme.
Style APA, Harvard, Vancouver, ISO itp.
34

Apostolopoulos, Pavlos Athanasios, Eirini Eleni Tsiropoulou i Symeon Papavassiliou. "Risk-Aware Data Offloading in Multi-Server Multi-Access Edge Computing Environment". IEEE/ACM Transactions on Networking 28, nr 3 (czerwiec 2020): 1405–18. http://dx.doi.org/10.1109/tnet.2020.2983119.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Inaba, Yuma, i Eiji okamoto. "Multi-user chaos MIMO-OFDM scheme for physical layer multi-access security". Nonlinear Theory and Its Applications, IEICE 5, nr 2 (2014): 172–83. http://dx.doi.org/10.1587/nolta.5.172.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Katsis, Petros, George Karagiannidis i Fotini-niovi Pavlidou. "Multi-user selection diversity for spread-spectrum multi-carrier multiple-access systems". IEEE Transactions on Communications 56, nr 12 (grudzień 2008): 2166–77. http://dx.doi.org/10.1109/tcomm.2008.050307.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Zheng, Jianchao, Honggang Zhang, Yueming Cai, Rongpeng Li i Alagan Anpalagan. "Game-Theoretic Multi-Channel Multi-Access in Energy Harvesting Wireless Sensor Networks". IEEE Sensors Journal 16, nr 11 (czerwiec 2016): 4587–94. http://dx.doi.org/10.1109/jsen.2016.2539346.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Zhou, Yuchen, Jian Chen i Yonghong Kuo. "Fairness Resource Allocation for Parallel Multi-Radio Access in Cognitive Multi-Cell". Wireless Personal Communications 88, nr 3 (21.01.2016): 587–602. http://dx.doi.org/10.1007/s11277-016-3180-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Maiya, Megha, i Bechir Hamdaoui. "iMAC: improved Medium Access Control for multi-channel multi-hop wireless networks". Wireless Communications and Mobile Computing 13, nr 11 (19.07.2011): 1060–71. http://dx.doi.org/10.1002/wcm.1160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Gill, Simardeep, Robert Quinn, Matthew Oliver, Fareed Kamar, Rameez Kabani, Daniel Devoe, Priyanka Mysore i in. "Multi-Disciplinary Vascular Access Care and Access Outcomes in People Starting Hemodialysis Therapy". Clinical Journal of the American Society of Nephrology 12, nr 12 (14.09.2017): 1991–99. http://dx.doi.org/10.2215/cjn.03430317.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Li, Dou, Feng Wang, Bing-hui Ji i Hai-ge Xiang. "The Predictive Multi-Access access Channel Allocation Scheme in Broadband Satellite Mesh Network". Journal of Electronics & Information Technology 30, nr 4 (11.03.2011): 763–67. http://dx.doi.org/10.3724/sp.j.1146.2006.01604.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Liu, Jing, Guochu Shou, Yaqiong Liu, Yihong Hu i Zhigang Guo. "Performance Evaluation of Integrated Multi-Access Edge Computing and Fiber-Wireless Access Networks". IEEE Access 6 (2018): 30269–79. http://dx.doi.org/10.1109/access.2018.2833619.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Sachs, Joachim, i Magnus Olsson. "Access network discovery and selection in the evolved 3GPP multi-access system architecture". European Transactions on Telecommunications 21, nr 6 (25.04.2010): 544–57. http://dx.doi.org/10.1002/ett.1410.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Bande, Meghana, Akshayaa Magesh i Venugopal V. Veeravalli. "Dynamic Spectrum Access Using Stochastic Multi-User Bandits". IEEE Wireless Communications Letters 10, nr 5 (maj 2021): 953–56. http://dx.doi.org/10.1109/lwc.2021.3051328.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Yu, Ye, Xiangyuan Bu, Kai Yang, Hongyuan Yang, Xiaozheng Gao i Zhu Han. "UAV-Aided Low Latency Multi-Access Edge Computing". IEEE Transactions on Vehicular Technology 70, nr 5 (maj 2021): 4955–67. http://dx.doi.org/10.1109/tvt.2021.3072065.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Pencheva, Evelina N., Ivaylo I. Atanasov i Vladislav G. Vladislavov. "Mission Critical Messaging Using Multi-Access Edge Computing". Cybernetics and Information Technologies 19, nr 4 (1.11.2019): 73–89. http://dx.doi.org/10.2478/cait-2019-0037.

Pełny tekst źródła
Streszczenie:
Abstract 5th Generation (5G) mobile system is expected to support the requirements of mission critical communications for ultra reliability and availability, and very low latency. With the development of messaging and data transfer in mobile networks, mission critical communication users see more and more potential in data communications. In this paper, we explore the capabilities of Multi-access Edge Computing (MEC) that appears to be a key 5G component, to provide short messaging service at the network edge. The provided use cases illustrate the capabilities for transferring mobile originating and mobile terminating short messages to and from mission critical mobile edge applications. The data model describes the service resource structure and the Application Programming Interface definitions illustrate how the mobile edge applications can use the service. Some implementation aspects related to behavioral logic of the network and applications are provided. The performance analysis enables estimation of latency introduced by the service.
Style APA, Harvard, Vancouver, ISO itp.
47

Borodin, V. V., A. M. Petrakov, V. A. Shevtsov i T. Ya Shevgunov. "Multi-Station Access without Acknowledgement in IoT Networks". Russian Aeronautics 62, nr 3 (lipiec 2019): 522–26. http://dx.doi.org/10.3103/s1068799819030243.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Pore, D., P. Hegade, D. Gaikwad, P. Patil i J. Patil. "Green Access to Multi-Component Synthesis of Spiropyranopyrazoles". Letters in Organic Chemistry 11, nr 2 (31.01.2014): 131–35. http://dx.doi.org/10.2174/15701786113106660069.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

BEN AYED, Souheil, i Fumio TERAOKA. "Collaborative Access Control for Multi-Domain Cloud Computing". IEICE Transactions on Information and Systems E95.D, nr 10 (2012): 2401–14. http://dx.doi.org/10.1587/transinf.e95.d.2401.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

R, Aishwarya Lakshmi, i Sashi Kumar D R. "Two Factor Data Access Control – Multi Authority Control". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 6 (30.06.2017): 537–67. http://dx.doi.org/10.23956/ijarcsse/v7i6/0306.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii