Статті в журналах з теми "Access list"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Access list".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Pleszkun, A. R., and M. J. Thazhuthaveetil. "An architecture for efficient Lisp list access." ACM SIGARCH Computer Architecture News 14, no. 2 (May 1986): 191–98. http://dx.doi.org/10.1145/17356.17378.
Повний текст джерелаSetapa, Sharipah, and Tengku Puteri Suhilah. "An Access Control List for Role-Based System: An Observation and Recommendation." International Journal of Information and Education Technology 4, no. 6 (2014): 468–72. http://dx.doi.org/10.7763/ijiet.2014.v4.452.
Повний текст джерелаKim, No-Whan. "The case study to verify of a network based on router applying an ACL(: Access List)." Journal of the Korea institute of electronic communication sciences 11, no. 5 (May 31, 2016): 491–98. http://dx.doi.org/10.13067/jkiecs.2016.11.5.491.
Повний текст джерелаThazhuthaveetil, Matthew J., and Andrew R. Pleszkun. "On the structural locality of reference in LISP list access streams." Information Processing Letters 26, no. 2 (October 1987): 105–10. http://dx.doi.org/10.1016/0020-0190(87)90046-9.
Повний текст джерелаMcMullen, Anthony. "Resist the list." Bottom Line 27, no. 1 (May 6, 2014): 2–5. http://dx.doi.org/10.1108/bl-02-2014-0005.
Повний текст джерелаA.B., Chate, and Chirchi V.R. "Access Control List Provides Security in Network." International Journal of Computer Applications 121, no. 22 (July 18, 2015): 14–16. http://dx.doi.org/10.5120/21831-5090.
Повний текст джерелаShchukin, V. Yu. "List decoding for a multiple access hyperchannel." Problems of Information Transmission 52, no. 4 (October 2016): 329–43. http://dx.doi.org/10.1134/s0032946016040025.
Повний текст джерелаDuffin, Christian. "Internet access high on nurses’ wish list." Nursing Management 7, no. 2 (May 1, 2000): 5. http://dx.doi.org/10.7748/nm.7.2.5.s5.
Повний текст джерелаKiberd, B., J. Boudreault, V. Bhan, and R. Panek. "Access to the Kidney Transplant Wait List." American Journal of Transplantation 6, no. 11 (November 2006): 2714–20. http://dx.doi.org/10.1111/j.1600-6143.2006.01523.x.
Повний текст джерелаZENG, Kuang-Yi. "Towards the Optimization of Access Control List." Journal of Software 18, no. 4 (2007): 978. http://dx.doi.org/10.1360/jos180978.
Повний текст джерелаSong, Junshuai, Zhao Li, Chang Zhou, Jinze Bai, Zhenpeng Li, Jian Li, and Jun Gao. "Co-Displayed Items Aware List Recommendation." IEEE Access 8 (2020): 64591–602. http://dx.doi.org/10.1109/access.2020.2984543.
Повний текст джерелаMarmurek, Harvey H. C., and Peter J. Kwantes. "Reading Words and Wirds: Phonology and Lexical Access." Quarterly Journal of Experimental Psychology Section A 49, no. 3 (August 1996): 696–714. http://dx.doi.org/10.1080/713755634.
Повний текст джерелаMohammad, Aijaz. "Access controls on bmj.com: List of countries with free access seems incomplete." BMJ 330, no. 7496 (April 14, 2005): 904.3. http://dx.doi.org/10.1136/bmj.330.7496.904-b.
Повний текст джерелаCai, Ning. "List Decoding for Arbitrarily Varying Multiple Access Channel Revisited: List Configuration and Symmetrizability." IEEE Transactions on Information Theory 62, no. 11 (November 2016): 6095–110. http://dx.doi.org/10.1109/tit.2016.2608900.
Повний текст джерелаWatson, Roger. "Beall's list of predatory open access journals: RIP." Nursing Open 4, no. 2 (February 28, 2017): 60. http://dx.doi.org/10.1002/nop2.78.
Повний текст джерелаAl Abdulmohsin, Ibrahim M. "Techniques and algorithms for access control list optimization." Computers & Electrical Engineering 35, no. 4 (July 2009): 556–66. http://dx.doi.org/10.1016/j.compeleceng.2008.08.003.
Повний текст джерелаZeng, Weixin, Xiang Zhao, Jiuyang Tang, and Haichuan Shang. "Collective List-Only Entity Linking: A Graph-Based Approach." IEEE Access 6 (2018): 16035–45. http://dx.doi.org/10.1109/access.2018.2817652.
Повний текст джерелаXu, Bin, Chenhao Ying, and Yuan Luo. "An Improved $A^{\ast}$ Decoding Algorithm With List Decoding." IEEE Access 6 (2018): 46877–85. http://dx.doi.org/10.1109/access.2018.2866396.
Повний текст джерелаDoan, Nghia, Seyyed Ali Hashemi, and Warren J. Gross. "Fast Successive-Cancellation List Flip Decoding of Polar Codes." IEEE Access 10 (2022): 5568–84. http://dx.doi.org/10.1109/access.2021.3140151.
Повний текст джерелаFeng, Guo Fu, Ming Wang, Ming Chen, and Tao Chi. "Optimizing the Performance for Nonbonded Force Calculation of Chemical Simulation on CBEA." Applied Mechanics and Materials 80-81 (July 2011): 322–26. http://dx.doi.org/10.4028/www.scientific.net/amm.80-81.322.
Повний текст джерелаReid, A. B., A. J. Grant, and P. D. Alexander. "List Detection for the$K$-Symmetric Multiple-Access Channel." IEEE Transactions on Information Theory 51, no. 8 (August 2005): 2930–36. http://dx.doi.org/10.1109/tit.2005.851775.
Повний текст джерелаCanady, Valerie A. "More funding, access, employment top 2019 readers' wish list." Mental Health Weekly 29, no. 2 (January 13, 2019): 3–5. http://dx.doi.org/10.1002/mhw.31732.
Повний текст джерелаGalloway, S., A. Sharma, J. Ward, and A. R. Bodenham. "A review of an anaesthetic led vascular access list." Anaesthesia 60, no. 8 (August 2005): 772–78. http://dx.doi.org/10.1111/j.1365-2044.2005.04189.x.
Повний текст джерелаJing, Changle, Jun Xiong, Xin Wang, Jibo Wei, and Yantao Guo. "Low-Complexity Group Alternate Iterative List Detection for MIMO Systems." IEEE Access 4 (2016): 5858–67. http://dx.doi.org/10.1109/access.2016.2607222.
Повний текст джерелаLaksono, Agung Tri, and M. Alvian Habib Nasution. "Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (January 25, 2020): 83. http://dx.doi.org/10.30865/json.v1i2.1920.
Повний текст джерелаWu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.
Повний текст джерелаZhang, Xiaojun, Rongquan Sui, Jianming Cui, Dexue Zhang, and Qingtian Zeng. "Efficient Sorting Architecture for List-Fast-SSC Decoding of Polar Codes." IEEE Access 6 (2018): 61773–81. http://dx.doi.org/10.1109/access.2018.2875756.
Повний текст джерелаKim, Jae-Won, Jun-Woo Tak, Hee-youl Kwak, and Jong-Seon No. "A New List Decoding Algorithm for Short-Length TBCCs With CRC." IEEE Access 6 (2018): 35105–11. http://dx.doi.org/10.1109/access.2018.2847348.
Повний текст джерелаLee, Kyungpil, and In-Cheol Park. "Large-Small Sorting for Successive Cancellation List Decoding of Polar Codes." IEEE Access 8 (2020): 96955–62. http://dx.doi.org/10.1109/access.2020.2996016.
Повний текст джерелаWang, Chao, Jian Yang, Huasen He, Ruida Zhou, Shuangwu Chen, and Xiaofeng Jiang. "Neighbor Cell List Optimization in Handover Management Using Cascading Bandits Algorithm." IEEE Access 8 (2020): 134137–50. http://dx.doi.org/10.1109/access.2020.3011015.
Повний текст джерелаCheng, Fengyi, Aijun Liu, Yingxian Zhang, and Jing Ren. "Bit-Flip Algorithm for Successive Cancellation List Decoder of Polar Codes." IEEE Access 7 (2019): 58346–52. http://dx.doi.org/10.1109/access.2019.2914691.
Повний текст джерелаNguyen, Thanh-Ngo, Loan T. T. Nguyen, Bay Vo, Ngoc-Thanh Nguyen, and Trinh D. D. Nguyen. "An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns." IEEE Access 8 (2020): 116840–55. http://dx.doi.org/10.1109/access.2020.3004530.
Повний текст джерелаSaha, Suman, Junbin Gao, and Richard Gerlach. "Stock Ranking Prediction Using List-Wise Approach and Node Embedding Technique." IEEE Access 9 (2021): 88981–96. http://dx.doi.org/10.1109/access.2021.3090834.
Повний текст джерелаP, Vidhya, and A. P. V. Raghavendra. "Protecting Global Records Sharing with Identity Based Access Control List." International Journal of Computer Applications Technology and Research 3, no. 11 (November 1, 2014): 661–63. http://dx.doi.org/10.7753/ijcatr0311.1001.
Повний текст джерелаWalsh, Gretchen. "African Newspaper Union List: low‐tech resource/high‐tech access." Library Hi Tech 18, no. 3 (September 2000): 215–23. http://dx.doi.org/10.1108/07378830010348116.
Повний текст джерелаGingerich, Barbara Stover. "Sanctions List Findings: How to Access, What Actions to Take." Home Health Care Management & Practice 14, no. 5 (August 2002): 389–90. http://dx.doi.org/10.1177/1084822302014005012.
Повний текст джерелаFirmansyah, Firmansyah, and Mochamad Wahyudi. "Analisis Performa Access Control List Menggunakan Metode Firewall Policy Base." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 31, 2021): 283–92. http://dx.doi.org/10.30812/matrik.v20i2.1068.
Повний текст джерелаFitriansyah, Ahmad, Alarik Andreansyah, and Abu Sopian. "Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan." Jurnal Teknologi Informatika dan Komputer 5, no. 2 (October 1, 2019): 58–63. http://dx.doi.org/10.37012/jtik.v5i2.176.
Повний текст джерелаAbdulla, Aziz. "Friends of Open Access." TJES Vol.27 No.3 (2020) 27, no. 3 (September 1, 2020): 1–7. http://dx.doi.org/10.25130/tjes.27.3.pb1.
Повний текст джерелаZhang, Huazi, Jiajie Tong, Rong Li, Pengcheng Qiu, Yourui Huangfu, Chen Xu, Xianbin Wang, and Jun Wang. "A Flip-Syndrome-List Polar Decoder Architecture for Ultra-Low-Latency Communications." IEEE Access 7 (2019): 1149–59. http://dx.doi.org/10.1109/access.2018.2886464.
Повний текст джерелаZhong, Hong, Bo Huang, Jie Cui, Yan Xu, and Lu Liu. "Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks." IEEE Access 6 (2018): 2241–50. http://dx.doi.org/10.1109/access.2017.2782672.
Повний текст джерелаWang, Lijin, Rongying Cai, Min Lin, and Yiwen Zhong. "Enhanced List-Based Simulated Annealing Algorithm for Large-Scale Traveling Salesman Problem." IEEE Access 7 (2019): 144366–80. http://dx.doi.org/10.1109/access.2019.2945570.
Повний текст джерелаWei, Chunting, Jiwei Qin, and Wei Zeng. "DNR: A Unified Framework of List Ranking With Neural Networks for Recommendation." IEEE Access 9 (2021): 158313–21. http://dx.doi.org/10.1109/access.2021.3130369.
Повний текст джерелаJacek, Anna, Klaudia Kędzior, and Sławomir Porada. "The waiting list as an instrument, rationalizing access to health care benefits." Zdrowie Publiczne 123, no. 2 (May 1, 2013): 112–15. http://dx.doi.org/10.12923/j.0044-2011/123-2/a.02.
Повний текст джерелаChen, Tianpei, and Harry Leib. "Selection Based List Detection With Approximate Matrix Inversion for Large-Scale MIMO Systems." IEEE Access 6 (2018): 71751–66. http://dx.doi.org/10.1109/access.2018.2881412.
Повний текст джерелаNam, Hyoju, Unil Yun, Bay Vo, Tin Truong, Zhi-Hong Deng, and Eunchul Yoon. "Efficient Approach for Damped Window-Based High Utility Pattern Mining With List Structure." IEEE Access 8 (2020): 50958–68. http://dx.doi.org/10.1109/access.2020.2979289.
Повний текст джерелаAlkhalili, Mohannad, Mahmoud H. Qutqut, and Fadi Almasalha. "Investigation of Applying Machine Learning for Watch-List Filtering in Anti-Money Laundering." IEEE Access 9 (2021): 18481–96. http://dx.doi.org/10.1109/access.2021.3052313.
Повний текст джерелаBeal, Eliza W., Dmitry Tumin, Lindsay Sobotka, Joseph D. Tobias, Don Hayes, Timothy M. Pawlik, Kenneth Washburn, Khalid Mumtaz, Lanla Conteh, and Sylvester M. Black. "Patients From Appalachia Have Reduced Access to Liver Transplantation After Wait-Listing." Progress in Transplantation 28, no. 4 (September 11, 2018): 305–13. http://dx.doi.org/10.1177/1526924818800037.
Повний текст джерелаHearnshaw, J. B. "Access to Telescopes in Developing Countries." Highlights of Astronomy 11, no. 2 (1998): 920–22. http://dx.doi.org/10.1017/s153929960001916x.
Повний текст джерелаMerivaki, Thessalia. "“Our Voter Rolls Are Cleaner Than Yours”: Balancing Access and Integrity in Voter List Maintenance." American Politics Research 48, no. 5 (February 17, 2020): 560–70. http://dx.doi.org/10.1177/1532673x20906472.
Повний текст джерела