Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „SHARED ACCESS LAYER – SERVICE“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "SHARED ACCESS LAYER – SERVICE" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "SHARED ACCESS LAYER – SERVICE"
Scott, Rachel E., und Gail Barton. „Promoting Interlibrary Loan in the Traditional Catalog and Discovery Layer: Two Pilot Projects“. Library Resources & Technical Services 62, Nr. 2 (04.04.2018): 74. http://dx.doi.org/10.5860/lrts.62n2.74.
Der volle Inhalt der QuelleQi, Min, und Junshu Wang. „Using the Internet of Things E-Government Platform to Optimize the Administrative Management Mode“. Wireless Communications and Mobile Computing 2021 (26.07.2021): 1–11. http://dx.doi.org/10.1155/2021/2224957.
Der volle Inhalt der QuelleOh, Se-Ra, und Young-Gab Kim. „AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth“. International Journal of Distributed Sensor Networks 16, Nr. 2 (Februar 2020): 155014772090638. http://dx.doi.org/10.1177/1550147720906388.
Der volle Inhalt der QuelleEdris, Ed Kamya Kiyemba, Mahdi Aiash und Jonathan Loo. „An Introduction of a Modular Framework for Securing 5G Networks and Beyond“. Network 2, Nr. 3 (22.07.2022): 419–39. http://dx.doi.org/10.3390/network2030026.
Der volle Inhalt der QuelleDugmore, Lois, und Saskia Bauweraerts. „When policy fails try something different integrated practice improve outcomes for dual diagnosis co-occurring service users accessing mental health services“. Drugs and Alcohol Today 21, Nr. 2 (22.02.2021): 157–70. http://dx.doi.org/10.1108/dat-06-2020-0036.
Der volle Inhalt der QuelleEl Bouchti, Abdelali, Abdelkrim Haqiq und Said El Kafhali. „Quality of Service Analysis and Queuing Performance Modeling of Orthogonal Frequency Division Multiple Access Based IEEE 802.16/WiMAX System“. International Journal of Mobile Computing and Multimedia Communications 4, Nr. 3 (Juli 2012): 54–70. http://dx.doi.org/10.4018/jmcmc.2012070104.
Der volle Inhalt der QuelleBerkani, Lamia, und Azeddine Chikh. „A Semantic Based Approach for Knowledge Capitalization in Communities of Practice of E-Learning“. International Journal of Knowledge Society Research 3, Nr. 4 (Oktober 2012): 1–11. http://dx.doi.org/10.4018/jksr.2012100101.
Der volle Inhalt der QuelleBoiron, Pierre, und Valère Dussaux. „Software Services Delivered from the Cloud“. International Journal of Information Systems in the Service Sector 7, Nr. 1 (Januar 2015): 22–37. http://dx.doi.org/10.4018/ijisss.2015010102.
Der volle Inhalt der QuelleHe, Chun Lin. „The Design and Implementation of the Information Remote Monitoring and Security Management System Based on Internet“. Advanced Materials Research 846-847 (November 2013): 1414–17. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1414.
Der volle Inhalt der QuelleDing, Fei, Aiguo Song, En Tong und Jianqing Li. „A Smart Gateway Architecture for Improving Efficiency of Home Network Applications“. Journal of Sensors 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/2197237.
Der volle Inhalt der QuelleDissertationen zum Thema "SHARED ACCESS LAYER – SERVICE"
Metin, Mehmet Ozer. „Creating Application Security Layer Based On Resource Access Decision Service“. Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.
Der volle Inhalt der Quelleenterprise-level"
and "
application-level"
security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security. Removing discrimination between enterprise-level and application-level security policies improves manageability, reusability and scalability of whole system. Resource Access Decision (RAD) specification has been implemented and used as authentication mechanism for this layer. RAD service not only provides encapsulating domain specific factors to give access decisions but also can form a solid base to apply positive and negative security model to secure enterprise web applications. Proposed solution has been used in a real life system and test results have been presented.
Zhong, Zhenzhe. „Cross-layer congestion control and quality of services in mobile networks“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT022.
Der volle Inhalt der QuelleThe mobile network is a hybrid network with Radio Access part and the fixed backhaul core network. The congestion control algorithms(CCA) designed for a specific type of system may not work as well in the other kind of network, especially the network with hybrid feature device like the mobile edge network. Generally, the bottleneck in a mobile network is the Radio access part. However, this is not always the case since multiple radio base stations or packet delivery network gateway can be sharing the same bottleneck in the packet delivery backhaul. In this thesis, we start from a cross-layer method and address the issue with a ubiquitous solution. The first algorithm we analysed is called CQIC, which get the PHY layer of UE involved in the congestion control design. An improvement from 3G CQIC to LTE scenario is proposed named DCIC. This algorithm uses the Downlink Control Indicator(DCI) instead of Channel Quality Indicator(CQI) to save the computation power on UE and take the scheduling result of eNB into consideration. Further, we evaluated current BBR algorithm, which focuses on the data centre network, in the mobile scenario. Most conventional CCA does not take the uplink BW degradation and other features in the cellular system into consideration in its bandwidth estimation method. Based on the review, we proposed the five tradeoff objectives to guide the CCA design in a mobile hybrid type of network: Bandwidth Utilisation, Delay (where loss is the extreme expression of delay), Fairness, Simplicity and Genericity. Based on the tradeoffs and goals, we proposed CDBE, a TCP clientside driven bandwidth estimation(CDBE) and report feedback loop. The client-side BW estimation method takes only little computation capability in the second version, compared to its first version and the DCIC. Cooperate with the enhanced server-side state transition CDBE can achieve a fair share of BW in both fixed packet core network or mobile network with a lower cost of RTT compared to conventional CCAs. No extra middlebox or edge computing unit/applications is required in CDBE architecture
Yrjölä, S. (Seppo). „Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks“. Doctoral thesis, Oulun yliopisto, 2017. http://urn.fi/urn:isbn:9789526214993.
Der volle Inhalt der QuelleTiivistelmä Jakamistalous on yksi suurista tulevaisuuden liiketoimintamahdollisuuksiin vaikuttavista trendeistä, eikä langaton tietoliikenne ole tässä poikkeus. Tulevaisuuden laajakaistaiset matkapuhelinverkot tulevat hyödyntämään erityyppisiä radiotaajuuksia, kuten jaettuja taajuuskaistoja, mikä vaatii muutoksia verkkojen toimintoihin ja hallintaan. Eri toimijoiden arvonluonti- ja ansaintamahdollisuuksien odotetaan muuttuvan näissä liikkuvan laajakaistan ekosysteemeissä regulaation, teknologian ja liiketoimintaympäristön kehittyessä, ei vain taajuuksien jakamisessa, vaan myös kun kyseessä on muiden resurssien kuten infrastruktuurin, teknologioiden tai tiedon jakaminen. Väitöskirja tutkii teknologia- ja liiketoimintaedellytyksiä taajuusjakomenetelmille matkapuhelinverkoissa, sekä esittelee ja analysoi menetelmien mahdollistamia liiketoimintamalleja ja strategisia valintoja. Strategia- ja liiketoiminta-analyyseissä käytettiin toimintatutkimus- ja skenaariomenetelmiä poikkitieteellisissä tutkimusprojekteissa yhteistyössä reguloinnin, liiketoiminnan ja tekniikan tutkimusyhteisöjen kanssa. Tutkimus esittelee uuden lähestymistavan taajuusjakotekniikoiden liiketoimintamallien skaalautuvuuden analysointiin jakamistalouden määritelmiä hyödyntäen. Tulokset osoittavat, että kaikki tutkitut tekniikat täyttävät perusedellytykset skaalautuvuudelle; Licensed Shared Access (LSA) hyödyntäen matkapuhelinoperaattorin olemassa olevia resursseja ja kyvykkyyksiä, Citizens Broadband Radio Service (CBRS) laajentaen liiketoimintamalleja tietoliikenteestä sisältöön, kontekstiin ja kaupankäyntialustoihin, sekä digitaalitelevision ja langattoman LTE-tekniikan hybridikäyttö UHF-taajuuskaistalla (HUHF) mahdollistaen uusia liiketoimintamahdollisuuksia lähentyvien tietoliikenne-, Internet- ja mediaekosysteemien välillä. Väitöskirja tulokset vahvistivat taajuuden jakamisen soveltuvuuden liikkuvan laajakaistaverkon ja saman taajuusalueen eri teollisuudenalan haltijan välillä suomalaisessa CORE kenttätestausympäristössä, ja laajensivat taajuusjakotekniikan sovellettavuutta myös muihin langattomiin järjestelmiin sisältö- ja mediajakelussa. Esitettyjä tuloksia voidaan hyödyntää tulevaisuuden langattomien laajakaistaverkkojen kehitystyössä vastaamaan ihmisten ja koneiden kasvaviin tietoliikennepalveluiden ja -kapasiteetin tarpeisiin hyödyntäen tehokkaita taajuusjakotekniikoita ja niiden mahdollistamia innovatiivisia liiketoimintamalleja
Gineste, Mathieu. „Spécification d'un cadre générique pour l'expression et le déploiement de la Qualité de Service dans les architectures de communication : application à une architecture de communication par satellite“. Paris 6, 2006. http://www.theses.fr/2006PA066267.
Der volle Inhalt der QuelleBoviz, Dora. „Communications multi-utilisateurs dans les réseaux d’accès radio centralisés : architecture, coordination et optimisation“. Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLC035/document.
Der volle Inhalt der QuelleIn future mobile networks denser deployment of radio access points is planned to satisfy demand of higher throughput, but an increased number of mobile users can suffer from inter-cell interference. Fortunately, the centralization of base-band processing offered by Cloud Radio Access Network (C-RAN) architecture enables coordination and joint physical layer processing between cells. To make practical deployment of these techniques possible, we have to study C-RAN in an end-to-end view regarding several aspects: the functional architecture of a deployment, the multi-cell coordination strategy, the implementation of multi-user signal processing and possibilities for optimization to increase operational efficiency.In this thesis, first, we propose an architecture defining the placement of base-band processing functions between the distributed remote units and the central processing unit. The aim of this design is to enable multi-cell processing both on the uplink and the downlink while requiring low data rate between the involved entities. Secondly, we study how low latency coordination can be realized inside the central unit using software defined networking adapted to radio access networks. Our demonstration through a real-time prototype deployment shows the feasibility of the proposed control framework. Finally, we investigate adaptive allocation of fronthaul rate that is used for transferring quantized base-band symbols for users participating in uplink multi-cell reception in order to exploit interference between them. We propose an optimization model that includes the cost of fronthaul tranmissions and aims to maximize the gain of network operators from multi-user transmissions in C-RAN. We solve the optimization problem for different fronthaul pricing models, in a scenario where real-time and accurate channel estimates are available and in another where only channel statistics are exploited. Using our method - fitting in the architecture that we have defined - cost efficiency of fronthaul usage can be significantly improved
Zigo, Peter. „Polyfunkční dům Arthur“. Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2015. http://www.nusl.cz/ntk/nusl-227263.
Der volle Inhalt der QuelleBen, Ameur Chiheb. „TCP Protocol Optimization for HTTP Adaptive Streaming“. Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S127/document.
Der volle Inhalt der QuelleHTTP adaptive streaming (HAS) is a streaming video technique widely used over the Internet. It employs Transmission Control Protocol (TCP) as transport protocol and it splits the original video inside the server into segments of same duration, called "chunks", that are transcoded into multiple quality levels. The HAS player, on the client side, requests for one chunk each chunk duration and it commonly selects the quality level based on the estimated bandwidth of the previous chunk(s). Given that the HAS clients are located inside access networks, our investigation involves several HAS clients sharing the same bottleneck link and competing for bandwidth. Here, a degradation of both Quality of Experience (QoE) of HAS users and Quality of Service (QoS) of the access network are often recorded. The objective of this thesis is to optimize the TCP protocol in order to solve both QoE and QoS degradations. Our first contribution consists of proposing a gateway-based shaping method, that we called Receive Window Tuning Method (RWTM); it employs the TCP flow control and passive round trip time estimation on the gateway side. We compared the performances of RWTM with another gateway-based shaping method that is based on queuing discipline, called Hierarchical Token Bucket shaping Method (HTBM). The results of evaluation indicate that RWTM outperforms HTBM not only in terms of QoE of HAS but also in terms of QoS of access network by reducing the queuing delay and significantly reducing packet drop rate at the bottleneck.Our second contribution consists of a comparative evaluation when combining two shaping methods, RWTM and HTBM, and four very common TCP variants, NewReno, Vegas, Illinois and Cubic. The results show that there is a significant discordance in performance between combinations. Furthermore, the best combination that improves performances in the majority of scenarios is when combining Illinois variant with RWTM. In addition, the results reveal the importance of an efficient updating of the slow start threshold value, ssthresh, to accelerate the convergence toward the best feasible quality level. Our third contribution consists of proposing a novel HAS-based TCP variant, that we called TcpHas; it is a TCP congestion control algorithm that takes into consideration the specifications of HAS flow. Besides, it estimates the optimal quality level of its corresponding HAS flow based on end-to-end bandwidth estimation. Then, it permanently performs HAS traffic shaping based on the encoding rate of the estimated level. It also updates ssthresh to accelerate convergence speed. A comparative performance evaluation of TcpHas with a recent and well-known TCP variant that employs adaptive decrease mechanism, called Westwood+, was performed. Results indicated that TcpHas largely outperforms Westwood+; it offers better quality level stability on the optimal quality level, it dramatically reduces the packet drop rate and it generates lower queuing delay
Sabir, Essaïd. „MAC protocols design and a cross-layered QoS framework for next generation wireless networks“. Phd thesis, Université d'Avignon, 2010. http://tel.archives-ouvertes.fr/tel-00544071.
Der volle Inhalt der QuellePrudík, Jiří. „Model metropolitní optické sítě“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217666.
Der volle Inhalt der QuelleJAIN, SANDEEP. „SHARED ACCESS LAYER – SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE“. Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15097.
Der volle Inhalt der QuelleBücher zum Thema "SHARED ACCESS LAYER – SERVICE"
Institute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplements to distributed queue dual bus (DQDB) access method and physical layer specifications : physical layer convergence procedure (PLCP) for DS1-based systems (Clause 12) and isochronous service on a distributed queue dual bus (DQDB) subnetwork of a metropolitan area network (MAN). New York: Institute of Electrical and Electronics Engineers, 1994.
Den vollen Inhalt der Quelle findenIEEE Computer Society. Technical Committee on Computer Communications., IEEE Standards Board und Institute of Electrical and Electronics Engineers., Hrsg. IEEE standards for local and metropolitan area networks: Supplement to distributed queue dual bus (DQDB) access method and physical layer specifications : connection-oriented service on a distributed queue dual bus (DQDB subnetwork of a metropolitan area network (MAN). New York: Institute of Electrical and Electronics Engineers, 1995.
Den vollen Inhalt der Quelle findenBicycle-sharing Systems across the United States of America. Organización Panamericana de la Salud, 2020. http://dx.doi.org/10.37774/9789275122143.
Der volle Inhalt der QuelleInstitute Of Electrical and Electronics Engineers. IEEE Standards for Local and Metropolitan Area Networks: Supplement to Distributed Queue Dual Bus (Dqdb) Access Method and Physical Layer Specifications ... Service on a Distributed Queue d. Institute of Electrical & Electronics Enginee, 1995.
Den vollen Inhalt der Quelle findenBurns, Tom, und Mike Firn. Service planning. Herausgegeben von Tom Burns und Mike Firn. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198754237.003.0028.
Der volle Inhalt der QuelleBeech, Roger. Health and social care services for older people: achievements, challenges, and future directions. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199689644.003.0003.
Der volle Inhalt der QuelleGandrud, Christopher. The Reproducibility of Governance Indicators. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198817062.003.0009.
Der volle Inhalt der QuelleBuchteile zum Thema "SHARED ACCESS LAYER – SERVICE"
Lee, Chee Kiam, Norfadzlia Mohd Yusof, Nor Ezam Selan und Dickson Lukose. „Service Oriented Architecture for Semantic Data Access Layer“. In Communications in Computer and Information Science, 93–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32826-8_10.
Der volle Inhalt der QuelleKorger, Ulrike, Christian Hartmann, Katsutoshi Kusume und Joerg Widmer. „Quality of Service Oriented Analysis of Cross-Layer Design in Wireless Ad Hoc Networks“. In Multiple Access Communications, 275–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15428-7_27.
Der volle Inhalt der QuelleVenieris, I. S., K. E. Mourelatou, N. D. Kalogeropoulos, M. E. Theologou und E. N. Protonotarios. „Service Management and Connection Identification in Shared Medium Access Networks“. In Network Management and Control, 165–74. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-1298-5_16.
Der volle Inhalt der QuelleIvanova, Daria, Ekaterina Karnauhova, Ekaterina Markova und Irina Gudkova. „Analyzing of Licensed Shared Access Scheme Model with Service Bit Rate Degradation in 3GPP Network“. In Information Technologies and Mathematical Modelling. Queueing Theory and Applications, 231–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68069-9_19.
Der volle Inhalt der QuelleZiadie, Haritz Ghozi, Meilita Tryana Sembiring und Beby Karina Fauzeea Sembiring. „Marketing Mix Strategy Using SWOT Analysis to Increase Market Share in PT Smartfren Telecom Tbk North Sumatera Area“. In Proceedings of the 19th International Symposium on Management (INSYMA 2022), 930–36. Dordrecht: Atlantis Press International BV, 2022. http://dx.doi.org/10.2991/978-94-6463-008-4_116.
Der volle Inhalt der QuelleRoos, Vera, Puleng Segalo und Ngenisiwe Ntombela. „Situationally and Relationally Guided Ethical Conduct for Researchers: A Community-Based Research Project to Design and Develop an ICT Intervention“. In Age-Inclusive ICT Innovation for Service Delivery in South Africa, 85–107. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94606-7_4.
Der volle Inhalt der QuelleSari, Arif. „Security Issues in Mobile Wireless Ad Hoc Networks“. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 66–94. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch005.
Der volle Inhalt der QuelleAlsobeh, Anas M. R., Aws Abed Al Raheem Magableh und Emad M. AlSukhni. „Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming“. In Cloud Security, 574–91. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch029.
Der volle Inhalt der QuelleGrimes, Neil, Genevieve R. Innes und Linda M. Salvesen. „How Libraries Support the Mental Health and Wellness Needs of Communities and Library Workers“. In Advances in Psychology, Mental Health, and Behavioral Studies, 78–109. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-5049-9.ch004.
Der volle Inhalt der QuelleSang, Aimin, Guosen Yue, Xiaodong Wang und Mohammad Madihian. „Cross-Layer Performance of Scheduling and Power Control Schemes in Space-Time Block Coded Downlink Packet Systems“. In Handbook on Advancements in Smart Antenna Technologies for Wireless Networks, 374–97. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-988-5.ch018.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "SHARED ACCESS LAYER – SERVICE"
McLain, Rachelle M., und Hannah McKelvey. „The Time Has Come... To Move Many Things: Inventorying and Preparing a Collection for Offsite Storage“. In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317169.
Der volle Inhalt der QuelleAtanasov, I. I., D. A. Marinska und E. N. Pencheva. „Open service access in cross layer design“. In 2011 Third International Workshop on Cross Layer Design (IWCLD 2011). IEEE, 2011. http://dx.doi.org/10.1109/iwcld.2011.6123088.
Der volle Inhalt der QuelleKim. „Toward fully-shared access: hybrid isp traffic control architecture and service plans exploiting excess bandwidth in shared access networks“. In 2016 International Workshop on Fiber Optics in Access Network (FOAN). IEEE, 2016. http://dx.doi.org/10.1109/foan.2016.7764540.
Der volle Inhalt der QuelleKim, Kyeong Soo. „Toward fully-shared access: Designing ISP service plans leveraging excess bandwidth allocation“. In 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983327.
Der volle Inhalt der QuelleGudkova, Irina, Konstantin Samouylov, Darya Ostrikova, Evgeniy Mokrov, Aleksei Ponomarenko-Timofeev, Sergey Andreev und Yevgeni Koucheryavy. „Service failure and interruption probability analysis for Licensed Shared Access regulatory framework“. In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382416.
Der volle Inhalt der QuelleQu, Hua, Jingmin Xin, Li Wang und Jihong Zhao. „Service-oriented resource multi-backupable method for multi-layer networks“. In 2011 1st International Symposium on Access Spaces (ISAS). IEEE, 2011. http://dx.doi.org/10.1109/isas.2011.5960959.
Der volle Inhalt der QuelleLu, J. X. „New QoS metrics and application layer proxy for GPRS/UMTS Internet access“. In Telecommunications Quality of Service: The Business of Success (QoS 2004). IEE, 2004. http://dx.doi.org/10.1049/ic:20040039.
Der volle Inhalt der QuelleDas, M. Swami, A. Govardhan und D. Vijaya lakshmi. „QoS web service Security Access Control case study using HTTP Secured Socket Layer Approach“. In the The International Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2832987.2833072.
Der volle Inhalt der QuelleRobinson-Oses, Lilliam N., und Miguel Vargas-Lombardo. „Service Layer and Axioms for User Access to the Cloud by Means of Ontologies“. In 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2012. http://dx.doi.org/10.1109/cyberc.2012.27.
Der volle Inhalt der QuelleKim, Kyeong Soo. „On guaranteeing the quality of service of conformant traffic in excess bandwidth allocation for shared access networks“. In 2015 36th IEEE Sarnoff Symposium. IEEE, 2015. http://dx.doi.org/10.1109/sarnof.2015.7324653.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "SHARED ACCESS LAYER – SERVICE"
Mohammadian, Abolfazl, Ehsan Rahimi, Mohammadjavad Javadinasr, Ali Shamshiripour, Amir Davatgari, Afshin Allahyari und Talon Brown. Analyzing the Impacts of a Successful Diffusion of Shared E-Scooters and Other Micromobility Devices and Efficient Management Strategies for Successful Operations in Illinois. Illinois Center for Transportation, Mai 2022. http://dx.doi.org/10.36501/0197-9191/22-006.
Der volle Inhalt der QuelleStakes, Keith, Keith Stakes, Julie Bryant, Nick Dow, Jack Regan und Craig Weinschenk. Analysis of the Coordination of Suppression and Ventilation in Multi-Family Dwellings. UL Firefighter Safety Research Institute, Juni 2020. http://dx.doi.org/10.54206/102376/ympj4047.
Der volle Inhalt der Quelle