Zeitschriftenartikel zum Thema „SHARED ACCESS LAYER – SERVICE“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "SHARED ACCESS LAYER – SERVICE" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Scott, Rachel E., und Gail Barton. „Promoting Interlibrary Loan in the Traditional Catalog and Discovery Layer: Two Pilot Projects“. Library Resources & Technical Services 62, Nr. 2 (04.04.2018): 74. http://dx.doi.org/10.5860/lrts.62n2.74.
Der volle Inhalt der QuelleQi, Min, und Junshu Wang. „Using the Internet of Things E-Government Platform to Optimize the Administrative Management Mode“. Wireless Communications and Mobile Computing 2021 (26.07.2021): 1–11. http://dx.doi.org/10.1155/2021/2224957.
Der volle Inhalt der QuelleOh, Se-Ra, und Young-Gab Kim. „AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth“. International Journal of Distributed Sensor Networks 16, Nr. 2 (Februar 2020): 155014772090638. http://dx.doi.org/10.1177/1550147720906388.
Der volle Inhalt der QuelleEdris, Ed Kamya Kiyemba, Mahdi Aiash und Jonathan Loo. „An Introduction of a Modular Framework for Securing 5G Networks and Beyond“. Network 2, Nr. 3 (22.07.2022): 419–39. http://dx.doi.org/10.3390/network2030026.
Der volle Inhalt der QuelleDugmore, Lois, und Saskia Bauweraerts. „When policy fails try something different integrated practice improve outcomes for dual diagnosis co-occurring service users accessing mental health services“. Drugs and Alcohol Today 21, Nr. 2 (22.02.2021): 157–70. http://dx.doi.org/10.1108/dat-06-2020-0036.
Der volle Inhalt der QuelleEl Bouchti, Abdelali, Abdelkrim Haqiq und Said El Kafhali. „Quality of Service Analysis and Queuing Performance Modeling of Orthogonal Frequency Division Multiple Access Based IEEE 802.16/WiMAX System“. International Journal of Mobile Computing and Multimedia Communications 4, Nr. 3 (Juli 2012): 54–70. http://dx.doi.org/10.4018/jmcmc.2012070104.
Der volle Inhalt der QuelleBerkani, Lamia, und Azeddine Chikh. „A Semantic Based Approach for Knowledge Capitalization in Communities of Practice of E-Learning“. International Journal of Knowledge Society Research 3, Nr. 4 (Oktober 2012): 1–11. http://dx.doi.org/10.4018/jksr.2012100101.
Der volle Inhalt der QuelleBoiron, Pierre, und Valère Dussaux. „Software Services Delivered from the Cloud“. International Journal of Information Systems in the Service Sector 7, Nr. 1 (Januar 2015): 22–37. http://dx.doi.org/10.4018/ijisss.2015010102.
Der volle Inhalt der QuelleHe, Chun Lin. „The Design and Implementation of the Information Remote Monitoring and Security Management System Based on Internet“. Advanced Materials Research 846-847 (November 2013): 1414–17. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1414.
Der volle Inhalt der QuelleDing, Fei, Aiguo Song, En Tong und Jianqing Li. „A Smart Gateway Architecture for Improving Efficiency of Home Network Applications“. Journal of Sensors 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/2197237.
Der volle Inhalt der QuelleWang, Lynn J. „AB 540: Tuition Waiver Policy in California: How Student Services Professionals Influence College Access for Undocumented Students“. Association of Mexican American Educators Journal 12, Nr. 1 (11.05.2018): 67. http://dx.doi.org/10.24974/amae.12.1.378.
Der volle Inhalt der QuelleAlsobeh, Anas M. R., Aws Abed Al Raheem Magableh und Emad M. AlSukhni. „Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming“. International Journal of Web Services Research 15, Nr. 1 (Januar 2018): 71–88. http://dx.doi.org/10.4018/ijwsr.2018010104.
Der volle Inhalt der QuelleBourgeois, Amber, Ashley Mollison, Tara C. Horrill, Leah Lambert und Kelli Stajduhar. „Falling off the treatment wagon: Barriers to cancer treatment and care for people experiencing health and social inequities.“ Journal of Clinical Oncology 40, Nr. 28_suppl (01.10.2022): 135. http://dx.doi.org/10.1200/jco.2022.40.28_suppl.135.
Der volle Inhalt der QuelleHussain, Md, und M. M. Beg. „Fog Computing for Internet of Things (IoT)-Aided Smart Grid Architectures“. Big Data and Cognitive Computing 3, Nr. 1 (19.01.2019): 8. http://dx.doi.org/10.3390/bdcc3010008.
Der volle Inhalt der QuelleFarooq, Muhammad Omer, und Thomas Kunz. „Contiki-Based IEEE 802.15.4 Channel Capacity Estimation and Suitability of Its CSMA-CA MAC Layer Protocol for Real-Time Multimedia Applications“. Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/398637.
Der volle Inhalt der QuelleBolton, Rosie, Simone Campana, Andrea Ceccanti, Xavier Espinal, Aristeidis Fkiaras, Patrick Fuhrmann und Yan Grange. „ESCAPE prototypes a data infrastructure for open science“. EPJ Web of Conferences 245 (2020): 04019. http://dx.doi.org/10.1051/epjconf/202024504019.
Der volle Inhalt der QuelleAhmad, Noman, Guftaar Ahmad Sardar Sidhu und Wali Ullah Khan. „A Learning Based Framework for Enhancing Physical Layer Security in Cooperative D2D Network“. Electronics 11, Nr. 23 (30.11.2022): 3981. http://dx.doi.org/10.3390/electronics11233981.
Der volle Inhalt der QuelleJones, Debra Maria, David Lyle, Claire Brunero, Lindy McAllister, Trish Webb und Stuart Riley. „Improving health and education outcomes for children in remote communities: A cross-sector and developmental evaluation approach“. Gateways: International Journal of Community Research and Engagement 8, Nr. 1 (03.09.2015): 1–22. http://dx.doi.org/10.5130/ijcre.v8i1.4163.
Der volle Inhalt der QuelleKhisa, Shreya, und Sangman Moh. „Medium Access Control Protocols for the Internet of Things Based on Unmanned Aerial Vehicles: A Comparative Survey“. Sensors 20, Nr. 19 (29.09.2020): 5586. http://dx.doi.org/10.3390/s20195586.
Der volle Inhalt der QuelleQiao, Huidong, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren und Ying Hu. „Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage“. Symmetry 10, Nr. 10 (11.10.2018): 482. http://dx.doi.org/10.3390/sym10100482.
Der volle Inhalt der QuelleWalsh, Lucas. „Whose risk and wellbeing? Three perspectives of online privacy in relation to children and young people’s wellbeing“. Media International Australia 170, Nr. 1 (Februar 2019): 90–99. http://dx.doi.org/10.1177/1329878x19828384.
Der volle Inhalt der QuelleKing, Kathryn, Dee Ford, Michael Haschker, Jillian Harvey, Ryan Kruis und James McElligott. „Clinical and Technical Considerations of an Open Access Telehealth Network in South Carolina: Definition and Deployment“. Journal of Medical Internet Research 22, Nr. 5 (22.05.2020): e17348. http://dx.doi.org/10.2196/17348.
Der volle Inhalt der QuelleCalhoun, Karen D., Laura Gultekin, Nikita Buckhoy, Tinetra Burns, Zachary Rowe, Lisa Braddix, Madiha Tariq et al. „3578 Partnership Development: A learning community to advance institutional responsiveness to the opioid crisis in the city of Detroit and Wayne, County, Michigan“. Journal of Clinical and Translational Science 3, s1 (März 2019): 92–93. http://dx.doi.org/10.1017/cts.2019.212.
Der volle Inhalt der QuelleCHEN, ZHONGQIANG, ALEX DELIS und PETER WEI. „IDENTIFICATION AND MANAGEMENT OF SESSIONS GENERATED BY INSTANT MESSAGING AND PEER-TO-PEER SYSTEMS“. International Journal of Cooperative Information Systems 17, Nr. 01 (März 2008): 1–51. http://dx.doi.org/10.1142/s0218843008001750.
Der volle Inhalt der QuelleKo, Chihjen, und Lex Wang. „Applying Design Thinking in Revising Data Curation of Taiwanese Herbaria“. Biodiversity Information Science and Standards 2 (22.05.2018): e25828. http://dx.doi.org/10.3897/biss.2.25828.
Der volle Inhalt der QuelleManthiramoorthy, Chinnadurai, K. Mohamed Sayeed Khan und Noorul Ameen A. „Comparing Several Encrypted Cloud Storage Platforms“. International Journal of Mathematics, Statistics, and Computer Science 2 (06.08.2023): 44–62. http://dx.doi.org/10.59543/ijmscs.v2i.7971.
Der volle Inhalt der QuelleTsyrulnyk, Serhii. „MOBILE APPLICATIONS AND ONLINE WI-FI MONITORING PLATFORMS OF WEATHER STATIONS“. OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, Nr. 9 (2020): 181–92. http://dx.doi.org/10.28925/2414-0325.2020.9.15.
Der volle Inhalt der QuelleV L, Pavani. „A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network“. International Journal of Interactive Mobile Technologies (iJIM) 12, Nr. 8 (24.12.2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Der volle Inhalt der QuelleGuleria, Pratiyush. „Data Access Layer: A Programming Paradigm on Cloud“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, Nr. 3 (15.10.2013): 2341–45. http://dx.doi.org/10.24297/ijct.v11i3.1164.
Der volle Inhalt der QuelleRay, Asok, und Shashi Phoha. „Service access procedure (SAP) for a transport layer protocol“. Telematics and Informatics 5, Nr. 1 (Januar 1988): 65–73. http://dx.doi.org/10.1016/s0736-5853(88)80009-1.
Der volle Inhalt der QuelleTemple, RM, und A. Donley. „The future hospital – implications for acute care“. Acute Medicine Journal 13, Nr. 1 (01.01.2014): 4–5. http://dx.doi.org/10.52964/amja.0330.
Der volle Inhalt der QuelleMei, Weidong, Zhi Chen, Jun Fang und Shaoqian Li. „Physical Layer Service Integration in 5G: Potentials and Challenges“. IEEE Access 6 (2018): 16563–75. http://dx.doi.org/10.1109/access.2018.2805728.
Der volle Inhalt der QuelleShaheen, Susan, Adam Cohen und Jacquelyn Broader. „What's the 'Big' Deal with Shared Micromobility? Evolution, Curb Policy, and Potential Developments in North America“. Built Environment 47, Nr. 4 (01.12.2021): 499–514. http://dx.doi.org/10.2148/benv.47.4.499.
Der volle Inhalt der QuelleChandnani, Manali, Mukesh Kumar Khandelwal und Meeta Sharma. „A Survey on Synchronization Approach in MAC Layer Protocols“. International Journal of Business Data Communications and Networking 13, Nr. 1 (Januar 2017): 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.
Der volle Inhalt der QuellePan, Fei, Zhibo Pang, Ming Xiao, Hong Wen und Run-Fa Liao. „Clone Detection Based on Physical Layer Reputation for Proximity Service“. IEEE Access 7 (2019): 3948–57. http://dx.doi.org/10.1109/access.2018.2888693.
Der volle Inhalt der QuelleLi, Dong, und Xi Lin Liu. „Study on E-Government Virtual Information Service Center Model Based on Cloud Computing“. Applied Mechanics and Materials 596 (Juli 2014): 971–75. http://dx.doi.org/10.4028/www.scientific.net/amm.596.971.
Der volle Inhalt der QuelleWang, Shouhong, und Hai Wang. „Shared Services Management“. International Journal of Information Systems in the Service Sector 7, Nr. 2 (April 2015): 37–53. http://dx.doi.org/10.4018/ijisss.2015040103.
Der volle Inhalt der QuelleRupp, Eduard, Emmanuel Syrmoudis und Jens Grossklags. „Leave No Data Behind – Empirical Insights into Data Erasure from Online Services“. Proceedings on Privacy Enhancing Technologies 2022, Nr. 3 (Juli 2022): 437–55. http://dx.doi.org/10.56553/popets-2022-0080.
Der volle Inhalt der QuelleJin, Biao, Mei-Huang Hong, Xue Lin und Jin-Ming Sha. „Service Sites Selection for Shared Bicycles Based on the Location Data of Mobikes“. IEEE Access 6 (2018): 54965–75. http://dx.doi.org/10.1109/access.2018.2872451.
Der volle Inhalt der QuelleOh, Eunsung, und Sung-Yong Son. „Shared Electrical Energy Storage Service Model and Strategy for Apartment-Type Factory Buildings“. IEEE Access 7 (2019): 130340–51. http://dx.doi.org/10.1109/access.2019.2939406.
Der volle Inhalt der QuelleZheng, Linfeng, Juncheng Hu und Yingjun Jiao. „A Cross-Layer Media Access Control Protocol for WBANs“. Sustainability 15, Nr. 14 (21.07.2023): 11381. http://dx.doi.org/10.3390/su151411381.
Der volle Inhalt der QuelleZhu, Quan Yin, Hong Zhou, Xiao Chun Shi und Rong Jing Hu. „The UML Model for Access Management System of Intelligent Warehouse Based on RFID“. Advanced Materials Research 383-390 (November 2011): 5855–60. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.5855.
Der volle Inhalt der QuelleBlažek, Lukáš. „Sustainability of a shared economy“. 11th GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES 11, Nr. 1 (09.12.2020): 59. http://dx.doi.org/10.35609/gcbssproceeding.2020.11(59).
Der volle Inhalt der QuelleAl-Otaibi, Yasser D. „A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications“. ACM Transactions on Internet Technology 22, Nr. 2 (31.05.2022): 1–17. http://dx.doi.org/10.1145/3430508.
Der volle Inhalt der QuelleBarth, Matthew, Michael Todd und Susan Shaheen. „Intelligent Transportation Technology Elements and Operational Methodologies for Shared-Use Vehicle Systems“. Transportation Research Record: Journal of the Transportation Research Board 1841, Nr. 1 (Januar 2003): 99–108. http://dx.doi.org/10.3141/1841-11.
Der volle Inhalt der QuelleFletcher, Tim, Déirdre Ní Chróinín, Mary O’Sullivan und Stephanie Beni. „Pre-service teachers articulating their learning about meaningful physical education“. European Physical Education Review 26, Nr. 4 (20.01.2020): 885–902. http://dx.doi.org/10.1177/1356336x19899693.
Der volle Inhalt der QuelleBates, Karla, Hannah Morgan, Emily Crosby, Keisha Nurse, Alison Flynn, Didi Stern, Roupen Baronian und Emma-Kate Kennedy. „Developing digital approaches for adolescents and young adults with autism and learning disabilities: Tools to facilitate access and shared decision-making“. Educational and Child Psychology 38, Nr. 3 (September 2021): 124–39. http://dx.doi.org/10.53841/bpsecp.2021.38.3.124.
Der volle Inhalt der QuelleZhao, Jun, und Tingyu Sheng. „Construction of Shared OCCA Model Based on Mobile Agent Technology“. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, Nr. 6 (04.11.2020): 795–803. http://dx.doi.org/10.2174/2352096512666191016120432.
Der volle Inhalt der QuelleNielsen, Susanne Balslev, und Rikke Brinkø. „Access over ownership: meeting facilities in Lyngby-Taarbæk Knowledge City“. Facilities 36, Nr. 1/2 (05.02.2018): 13–23. http://dx.doi.org/10.1108/f-01-2017-0001.
Der volle Inhalt der QuelleWang, Yan, Shao Yun Guan und Wei Hong Li. „The Research and Design of the Intelligence Application Platform in Public Security E-Government“. Advanced Materials Research 981 (Juli 2014): 192–95. http://dx.doi.org/10.4028/www.scientific.net/amr.981.192.
Der volle Inhalt der Quelle