Добірка наукової літератури з теми "Multi-access"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Multi-access".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Multi-access"

1

Lee, Donghyuk, Saugata Ghose, Gennady Pekhimenko, Samira Khan, and Onur Mutlu. "Simultaneous Multi-Layer Access." ACM Transactions on Architecture and Code Optimization 12, no. 4 (January 7, 2016): 1–29. http://dx.doi.org/10.1145/2832911.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Alderson, Priscilla, Mary Madden, Ann Oakley, and Ruth Wilkins. "Access and multi-centre research." Monash Bioethics Review 14, no. 4 (October 1995): 18–22. http://dx.doi.org/10.1007/bf03351194.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tatipally, Sampath Kumar, and Dr K. Shahu Chatrapathi. "Efficient Access Control and Security for Multi-Authority Cloud Storage Server." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 804–7. http://dx.doi.org/10.31142/ijtsrd4599.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Vaidya, Kanishak, and Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches." Entropy 25, no. 8 (August 18, 2023): 1228. http://dx.doi.org/10.3390/e25081228.

Повний текст джерела
Анотація:
We consider the problem of multi-access cache-aided multi-user Private Information Retrieval (MACAMuPIR) with cyclic wraparound cache access. In MACAMuPIR, several files are replicated across multiple servers. There are multiple users and multiple cache nodes. When the network is not congested, servers fill these cache nodes with the content of the files. During peak network traffic, each user accesses several cache nodes. Every user wants to retrieve one file from the servers but does not want the servers to know their demands. This paper proposes a private retrieval scheme for MACAMuPIR and characterizes the transmission cost for multi-access systems with cyclic wraparound cache access. We formalize privacy and correctness constraints and analyze transmission costs. The scheme outperforms the previously known dedicated cache setup, offering efficient and private retrieval. Results demonstrate the effectiveness of the multi-access approach. Our research contributes an efficient, privacy-preserving solution for multi-user PIR, advancing secure data retrieval from distributed servers.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gelabert, Xavier, Oriol Sallent, Jordi Pérez-Romero, and Ramon Agustí. "Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks." Computer Networks 55, no. 1 (January 2011): 173–92. http://dx.doi.org/10.1016/j.comnet.2010.08.009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kolyeva, Natalya. "Organization of multi-access in databases." E3S Web of Conferences 270 (2021): 01006. http://dx.doi.org/10.1051/e3sconf/202127001006.

Повний текст джерела
Анотація:
A particular, but important problem of freeing database memory in multi-access conditions is considered. A number of solutions to this problem are proposed and their advantages and disadvantages are noted. Three methods of organizing work with free space are considered. The first method assumes two additional modes of capturing pages: “Joint deletion” and “deletion”. In the second method, the pages after the last tuple have been deleted are inserted at the end of the free list. The third method involves the actual presentation of the freed pages of the relationship to the free memory pool of the segment and is postponed until the relationship is reorganized.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tanaka, Hiroyuki, Masahiro Yoshida, Koya Mori, and Noriyuki Takahashi. "Multi-access Edge Computing: A Survey." Journal of Information Processing 26 (2018): 87–97. http://dx.doi.org/10.2197/ipsjjip.26.87.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Filali, Abderrahime, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane, and Mohsen Guizani. "Multi-Access Edge Computing: A Survey." IEEE Access 8 (2020): 197017–46. http://dx.doi.org/10.1109/access.2020.3034136.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Newmann, Scott. "Multi-vendor interoperability through SQL access." ACM SIGMOD Record 21, no. 2 (June 1992): 414. http://dx.doi.org/10.1145/141484.130345.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Dua, Aditya. "Random Access with Multi-Packet Reception." IEEE Transactions on Wireless Communications 7, no. 6 (June 2008): 2280–88. http://dx.doi.org/10.1109/twc.2008.070010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Multi-access"

1

Greaves, David J. "Multi-access metropolitan area networks." Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303053.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.

Повний текст джерела
Анотація:
The primary focus of this research is an examination of the issues involved in the granting of access in an environment characterised by multiple users, multiple resources and multiple levels of access permission. Increasing levels of complexity in automotive systems provides opportunities for improving the integration and efficiency of the services provided to the operator. The vehicle lease / hire environment provided a basis for evaluating conditional access to distributed, mobile assets where the principal medium for operating in this environment is the Smart Card. The application of Smart Cards to existing vehicle management systems requires control of access to motor vehicles, control of vehicle operating parameters and secure storage of operating information. The issues addressed include examination of the characteristics of the operating environment, development of a model and design, simulation and evaluation of a multiple application Smart Card. The functions provided by the card include identification and authentication, secure hash and encryption functions which may be applied, in general, to a wide range of access problems. Evaluation of the algorithms implemented indicate that the Smart Card design may be provably secure under single use conditions and conditionally secure under multiple use conditions. The simulation of the card design provided data to support further research and shows the design is practical and able to be implemented on current Smart Card types.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Choi, Byoung Jo. "Multi-carrier code division multiple access." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394098.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Stirling-Gallacher, Richard. "Multi-carrier code division multiple access." Thesis, University of Edinburgh, 1997. http://hdl.handle.net/1842/13027.

Повний текст джерела
Анотація:
The topic of this thesis is the use of multi-carrier modulation with code division multiple access (CDMA). The motivation of this work is to establish if the combination of multi-carrier modulation with CDMA has a performance advantage over a conventional direct sequence CDMA (DS-CDMA) communication system. In this thesis three types of multi-carrier CDMA are identified and the main work is concentrated on one particular combination, which is referred to as one chip per carrier multi-carrier CDMA system. This system itself, however can be split into different variations and an examination of two of these is made. The first of these one chip per carrier multi-carrier CDMA systems utilises the same number of carriers as the spreading sequence length. The carriers overlap and adjacent chips of the spreading sequence modulate adjacent carriers. There is no guard interval and therefore intercarrier interference occurs. If the receiver is synchronised and has a perfect estimate of the channel, it is shown that this multi-carrier CDMA system has comparable performance to a DS-CDMA system of the same bandwidth. It is further shown that it is simple to compute the minimum mean square error criteria as the equaliser consists of N one tap equalisers, where N is the number of carriers. The second system utilises many overlapping low data rate orthogonal carriers. The orthogonality of the carriers is maintained due to cyclically extended guard interval and the number of carriers is much higher than the spreading sequence length. After spreading, the data streams are interleaved onto the carriers to maximise diversity. A practical form of maximum likelihood detection for 64 users is described. It is shown from simulation results that when the system is used in conjunction with ½ rate (constraint length 7) coding and equal gain combining the system can support 64 users at 6 dB E6/N6 for a bit error rate of 2 x 10-3. This compares with an equivalent DS-CDMA system which can only support 16 users for the same bit error rate and E6/No. These results assume perfect channel knowledge and synchronisation. It is further shown that to provide high spectral efficiency in a coded system a high rate convolutional coding scheme is needed. A combined decoder/canceller is also presented. Finally, techniques to achieve synchronisation and channel estimation algorithms are presented. These algorithms are considered in conjunction with the second system. In the framework of synchronisation, methods are presented for frequency and timing synchronisation. For channel estimation, simulation results are presented for a simple channel estimator.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Athamnah, Malek. "ENABLING MULTI-PARTY COLLABORATIVE DATA ACCESS." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/528695.

Повний текст джерела
Анотація:
Computer and Information Science
Ph.D.
Cloud computing has brought availability of services at unprecedented scales but data accessibility considerations become more complex due to involvement of multiple parties in providing the infrastructure. In this thesis, we discuss the problem of enabling cooperative data access in a multi-cloud environment where the data is owned and managed by multiple enterprises. We consider a multi-party collaboration scheme whereby a set of parties collectively decide accessibility to data from individual parties using different data models such as relational databases, and graph databases. In order to implement desired business services, parties need to share a selected portion of information with one another. We consider a model with a set of authorization rules over the joins of basic relations, and such rules are defined by these cooperating parties. The accessible information is constrained by these rules. Specifically, the following critical issues were examined: Combine rule enforcement and query planning and devise an algorithm which simultaneously checks for the enforceability of each rule and generation of minimum cost plan of its execution using a cost metric whenever the enforcement is possible; We also consider other forms of limiting the access to the shared data using safety properties and selection conditions. We proposed algorithms for both forms to remove any conflicts or violations between the limited accesses and model queries; Used graph databases with our authorization rules and query planning model to conduct similarity search between tuples, where we represent the relational database tuples as a graph with weighted edges, which enables queries involving "similarity" across the tuples. We proposed an algorithm to exploit the correlations between attributes to create virtual attributes that can be used to catch much of the data variance, and enhance the speed at which similarity search occurs; Proposed a framework for defining test functionalities their composition, and their access control. We discussed an algorithm to determine the realization of the given test via valid compositions of individual functionalities in a way to minimize the number of parties involved. The research significance resides in solving real-world issues that arise in using cloud services for enterprises After extensive evaluations, results revealed: collaborative data access model improves the security during cooperative data processes; systematic and efficient solving access rules conflict issues minimizes the possible data leakage; and, a systematic approach tackling control failure diagnosis helps reducing troubleshooting times and all that improve availability and resiliency. The study contributes to the knowledge, literature, and practice. This research opens up the space for further studies in various aspects of secure data cooperation in large-scale cyber and cyber-physical infrastructures.
Temple University--Theses
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective." Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.

Повний текст джерела
Анотація:
In the thesis, we address the fundamental problem of opportunistic spectrum access in a multi-channel communication system. Specifically, we consider a communication system in which a user has access to multiple channels, but is limited to sensing and transmitting only on one at a given time. We explore how the smart user should exploit past observations and the knowledge of the stochastic properties of these channels to maximize its transmission rate by switching channels opportunistically. Formally, we provide a generic analysis on the opportunistic spectrum access problem by casting the problem into the restless multi-armed bandit (RMAB) problem, one of the most well-known generalizations of the classic multi-armed bandit (MAB) problem, which is of fundamental importance in stochastic decision theory. Despite the significant research efforts in the field, the RMAB problem in its generic form still remains open. Until today, very little result is reported on the structure of the optimal policy. Obtaining the optimal policy for a general RMAB problem is often intractable due to the exponential computation complexity. Hence, a natural alternative is to seek a simple myopic policy maximizing the short-term reward. Therefore, we develop three axioms characterizing a family of functions which we refer to as regular functions, which are generic and practically important. We then establish the optimality of the myopic policy when the reward function can be expressed as a regular function and the discount factor is bounded by a closed-form threshold determined by the reward function. We also illustrate how the derived results, generic in nature, are applied to analyze a class of RMAB problems arising from multi-channel opportunistic access. Next, we further investigate the more challenging problem where the user has to decide the number of channels to sense in each slot in order to maximize its utility (e.g., throughput). After showing the exponential complexity of the problem, we develop a heuristic v-step look-ahead strategy. In the developed strategy, the parameter v allows to achieve a desired tradeoff between social efficiency and computation complexity. We demonstrate the benefits of the proposed strategy via numerical experiments on several typical settings.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Garnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.

Повний текст джерела
Анотація:

Large data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, computational power spent on access control routines, procedures for administration and key distribution and availability of extension features needed in large scale data center scenarios. Our administration analysis will propose and present possible methods for initial key distribution to new machines in the data center, as well as methods for enrolling new users. We will also propose a method for automatic service instantiation in Kerberos and present a method for service instantiation in PKI. We will look at how the systems handle failed machines in the network, and look at how the systems handle breaches of trusted components. Our performance analysis will show that under given assumptions, both Kerberos and PKI will handle the average load in a hypothetical data center consisting of 100000 machines and 1000 users. We will also see that under an assumed peak load, Kerberos will be able to handle 10000 service requests in under 1 second, whereas the PKI solution would need at least 15 seconds to handle the same number of requests using recommended public key sizes. This means that some programs may need special configurations to work in a PKI system under high load.

Стилі APA, Harvard, Vancouver, ISO та ін.
8

羅福隆 and Fook-loong Lo. "Performance of multi-channel random access networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31236029.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Telatar, Ä°brahim Emre. "Multi-access communications with decision feedback decoding." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13237.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1992.
Includes bibliographical references (leaves 84-85) and index.
by Ä°brahim Emre Telatar.
Ph.D.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yang, Xu. "Multi-channel Mobile Access to Web Services." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30270.

Повний текст джерела
Анотація:
To support wireless-oriented services, a new generation of Web services called Mobile services (M-services) has emerged. M-services provide mobile users access to services through wireless networks. One of the important issues in M-service environment is how to discover and access M-services efficiently. In this dissertation, we propose time and power efficient access methods for M-services. We focus on methods for accessing broadcast based M-services from multiple wireless channels. We first discuss efficient access methods in data-oriented wireless broadcast systems. We then discuss how to extend current wireless broadcast systems to support simple M-services. We present a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Multi-channel algorithms are proposed for efficiently accessing composite services. We define a few semantics that have impact on access efficiency in the proposed infrastructure. We discuss semantic access to composite services. Broadcast channel organizations suitable for discovering and accessing composite services are proposed. We also derive analytical models for these channel organizations. To provide practical study for the proposed infrastructure and access methods, a testbed is developed for simulating accessing M-services in a broadcast-based environment. Extensive experiments have been conducted to study the proposed access methods and broadcast channel organizations. The experimental results are presented and discussed.
Ph. D.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Multi-access"

1

Center, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Center, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Center, Goddard Space Flight, ed. Multi-access laser communications terminal: Final report. Saint Louis, Mo: Laser Data Technology, Inc., 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Anastasopoulos, Achilles. Cross model access in the multi-lingual, multi-model database management system. Monterey, Calif: Naval Postgraduate School, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gaffney, Kevin J. Techniques for multi-network access to multimedia messages. Dublin: University College Dublin, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sabella, Dario. Multi-access Edge Computing: Software Development at the Network Edge. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79618-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mores, Robert. Fibre-optic, multi-access network for intracar and manufacturing environments. Leicester: De Montfort University, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Muntean, Gabriel-Miro, and Ramona Trestian. Wireless multi-access environments and quality of service provisioning: Solutions and application. Hershey PA: Information Science Reference, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Bartalesi-Graf, Daniela, and Colleen Ryan. Caleidoscopio with MyItalianLab (multi Semester Access) -- Access Card Package. Pearson Education, Limited, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Stelzer, Tim, and Paul A. Tipler. Tipler WebAssign Access Card & SmartPhysics Multi-Term Access Card. W. H. Freeman, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Multi-access"

1

Shekhar, Shashi, and Hui Xiong. "Multi-Dimensional Access Structures." In Encyclopedia of GIS, 758. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_841.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Conforto, Paolo, and Clementina Tocci. "Multi-Segment Access Network." In Space/Terrestrial Mobile Networks, 13–45. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470021039.ch2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Prasad, Ramjee, Muhammad Imadur Rahman, Suvra Sekhar Das, and Nicola Marchetti. "Multi-Carrier Based Access Techniques." In Single- And Multi-Carrier Mimo Transmission for Broadband Wireless Systems, 61–107. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339533-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Park, Sun Rae, Jong Suk Ruth Lee, Kum Won Cho, and Kyu-Chul Lee. "Multi-level Access Control for GeoContents." In Communications in Computer and Information Science, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-26010-0_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Shibao, Kazunori, Aiichiro Higure, and Koji Yamaguchi. "Access Device 2: Multi-Channel Port." In Reduced Port Laparoscopic Surgery, 45–56. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54601-6_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Morais, Douglas H. "Multi-carrier-Based Multiple-Access Techniques." In Key 5G Physical Layer Technologies, 129–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51441-9_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Shetty, Rajaneesh Sudhakar. "Multi-Access Edge Computing in 5G." In 5G Mobile Core Network, 69–102. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Morais, Douglas H. "Multi-Carrier-Based Multiple-Access Techniques." In Key 5G Physical Layer Technologies, 143–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89209-8_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Akman, Gizem, Philip Ginzboorg, and Valtteri Niemi. "Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications." In Computational Science and Its Applications – ICCSA 2021, 44–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87010-2_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chen, Ying, Ning Zhang, Yuan Wu, and Sherman Shen. "Energy-Efficient Multi-Task Multi-Access Computation Offloading via NOMA." In Energy Efficient Computation Offloading in Mobile Edge Computing, 123–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16822-2_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Multi-access"

1

Koudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs, and H. Tang. "Access Flow based Multi-Radio Access Connectivity." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Squicciarini, Anna Cinzia, Sarah Michele Rajtmajer, and Nicola Zannone. "Multi-Party Access Control." In SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205977.3205999.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vetter, P. "Multi service access everywhere." In 31st European Conference on Optical Communications (ECOC 2005). IEE, 2005. http://dx.doi.org/10.1049/cp:20050833.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jorguseski, Ljupco, Remco Litjens, Chen Zhiyi, and Homayon Nikookar. "Radio Access Selection in Multi-Radio Access Systems." In 2007 14th IEEE Symposium on Communications and Vehicular Technology in the Benelux. IEEE, 2007. http://dx.doi.org/10.1109/scvt.2007.4436230.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rad, A. Hamed Mohsenian, and Vincent W. S. Wong. "Distributed Multi-Interface Multi-Channel Random Access." In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.1033.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

de Sousa, V. A., R. A. de O. Neto, F. de S. Chaves, L. S. Cardoso, and F. R. P. Cavalcanti. "Access selection with connection reallocation for multi-access networks." In ITS '07. 2007 International Telecommunications Symposium. IEEE, 2006. http://dx.doi.org/10.1109/its.2006.4433347.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sachs, J., R. Aguero, M. Berg, J. Gebert, L. Jorguseski, I. Karla, P. Karlsson, et al. "Migration of Existing Access Networks Towards Multi-Radio Access." In IEEE Vehicular Technology Conference. IEEE, 2006. http://dx.doi.org/10.1109/vtcf.2006.616.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Wang, Lei, Haizhou Wang, Xue Jiang, Jingwu Cui, and Baoyu Zheng. "Multi-Access Edge Computing using Mode Division Multiple Access." In 2022 14th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2022. http://dx.doi.org/10.1109/wcsp55476.2022.10039371.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Yaish, Haitham, and Madhu Goyal. "Multi-tenant Database Access Control." In 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.131.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Nzomo, Peggy, Victoria L. Rubin, and Isola Ajiferuke. "Multi-lingual information access tools." In the 2012 iConference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2132176.2132276.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Multi-access"

1

Kanugovi, S., F. Baboescu, J. Zhu, and S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8743.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zhu, J., and S. Kanugovi. Generic Multi-Access (GMA) Encapsulation Protocol. RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9188.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Maggio, Gian M., David Laney, and Lawrence Larson. BER and Error-Floor Calculation for Multi-Access PCTH. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada414339.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Kondi, Lisimachos P. Scalable Video Transmission Over Multi-Rate Multiple Access Channels. Fort Belvoir, VA: Defense Technical Information Center, June 2007. http://dx.doi.org/10.21236/ada470529.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Liu, Keqin, and Qing Zhao. Link Throughput of Multi-Channel Opportunistic Access with Limited Sensing. Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada575936.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Melia, T., and S. Gundavelli, eds. Logical-Interface Support for IP Hosts with Multi-Access Support. RFC Editor, May 2016. http://dx.doi.org/10.17487/rfc7847.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kazakos, D., and I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, February 1987. http://dx.doi.org/10.21236/ada186041.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zeger, Linda, and Amanda Peters. Efficient Methods for Broadcasting Multi-Slot Messages with Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, April 2011. http://dx.doi.org/10.21236/ada570576.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Peters, Amanda, and Linda Zeger. Efficient Resource Allocation for Broadcasting Multi-Slot Messages With Random Access with Capture. Fort Belvoir, VA: Defense Technical Information Center, March 2011. http://dx.doi.org/10.21236/ada541058.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ooghe, S., N. Voigt, M. Platnic, T. Haag, and S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5851.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії