Academic literature on the topic 'CONTENT ACCESS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CONTENT ACCESS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CONTENT ACCESS"

1

Moffett, Jonathan D., and Morris S. Sloman. "Content-dependent access control." ACM SIGOPS Operating Systems Review 25, no. 2 (1991): 63–70. http://dx.doi.org/10.1145/122120.122125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jalil Piran, Md, S. M. Riazul Islam, and Doug Young Suh. "CASH: Content- and Network-Context-Aware Streaming Over 5G HetNets." IEEE Access 6 (2018): 46167–78. http://dx.doi.org/10.1109/access.2018.2864790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fan, Yuqi, Bing Yang, Donghui Hu, Xiaohui Yuan, and Xiong Xu. "Social- and Content-Aware Prediction for Video Content Delivery." IEEE Access 8 (2020): 29219–27. http://dx.doi.org/10.1109/access.2020.2972920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Guhyun, Vladimir Kornijcuk, Jeeson Kim, Dohun Kim, Cheol Seong Hwang, and Doo Seok Jeong. "Combination-Encoding Content-Addressable Memory With High Content Density." IEEE Access 7 (2019): 137620–28. http://dx.doi.org/10.1109/access.2019.2942150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ryu, Seung-Kwan, Chang-Hee Park, and Jong-Bae Hong. "Content Analysis of Public Access Programs." Journal of the Korea Contents Association 12, no. 1 (2012): 146–53. http://dx.doi.org/10.5392/jkca.2012.12.01.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Geißler, Stefan. "New methods to access scientific content." Information Services & Use 28, no. 2 (2008): 141–46. http://dx.doi.org/10.3233/isu-2008-0563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schewe, Klaus Dieter, N. A. Kinshuk, and Tiong Goh. "Content adaptivity in wireless web access." International Journal of Mobile Communications 2, no. 3 (2004): 260. http://dx.doi.org/10.1504/ijmc.2004.005164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Desai, Rutvik H. "Access and content of abstract concepts." Physics of Life Reviews 29 (July 2019): 166–68. http://dx.doi.org/10.1016/j.plrev.2019.03.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Koumpis, K., and S. Renals. "Content-based access to spoken audio." IEEE Signal Processing Magazine 22, no. 5 (2005): 61–69. http://dx.doi.org/10.1109/msp.2005.1511824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bieri, Tamberlyn, Darin Blasiar, Philip Ozersky, et al. "WormBase: new content and better access." Nucleic Acids Research 35, suppl_1 (2006): D506—D510. http://dx.doi.org/10.1093/nar/gkl818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CONTENT ACCESS"

1

Helberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /." [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weiss, Ron 1970. "Content-based access to algebraic video." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/12044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Vita.<br>Includes bibliographical references (p. 129-142).<br>A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.<br>(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.<br>by Kevin E. Fu.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
4

Ragab, Hassen Hani. "Key management for content access control in hierarchical environments." Compiègne, 2007. http://www.theses.fr/2007COMP1718.

Full text
Abstract:
Le besoin du contrôle d'accès au contenu dans les hiérarchies (CACH) apparaît naturellement dans de nombreux contextes, allant des départements gouvernementaux aux jeux interactifs, et de la diffusion multi-niveaux des données au contrôle d'accès dans les bases de données. Tous ces contextes ont un point commun, c'est d'avoir besoin de s'assurer que les différentes entités n'accèdent qu'aux ressources auxquelles elles sont autorisées. Le contrôle d'accès au contenu consiste à effectuer cette dernière tâche. Contrôler l'accès aux ressources est généralement assuré en chiffrant les ressources du système et en donnant les clés utilisées pour le chiffrement de ces ressources aux utilisateurs qui y sont autorisés. La génération et la gestion de telles clés est un besoin crucial pour le déploiement des systèmes de contrôle d'accès au contenu. De plus, les hiérarchies à large échelle avec des membres qui changent leurs droits d'accès fréquemment exigent un passage à l'échelle performant du mécanisme de gestion de clés. Dans le cadre de cette thèse, nous nous focalisons sur la gestion de clés pour le contrôle d'accès au contenu. Nous commençons par donner les briques de base de la gestion de clés pour le CACH. Par la suite, nous étudions les schémas de gestion de clés existants et les classifions en deux catégories, à savoir l'approche des clés dépendantes et l'approche des clés indépendantes. Par ailleurs, nous proposons un modèle générique pour représenter les schémas de l'approche des clés indépendantes et l'utilisons pour définir des bornes inférieures sur les coûts de gestion des clés. Par la suite, nous proposons un nouveau schéma indépendant de gestion de clé et prouvons son optimalité en montrant que ses performances atteignent les bornes inférieures. L'optimalité de ce schéma constitue l'un des apports les plus importants de cette thèse. Ensuite, nous proposons deux nouveaux schémas efficaces de l'approche des clés dépendantes et nous les évaluons par simulations et par une modélisation avec les processus de Markov. Enfin, nous proposons une variante de ces schémas qui permet de définir des compromis pertinents sur les différents critères de performances<br>Lots of applications, ranging from interactive online games to business corporations and government departments, and from multi-layered data streaming to databases access control, require ensuring that its users respect some access control restrictions. Content access control in hierarchies (CACH) consists in ensuring, using cryptographic techniques, that the users access application resources to which they are entitled. Content access control is generally ensured by encrypting the system resources and giving the keys to users having access to them. Generating and managing those keys is a crucial requirement for the deployment of content access control systems. Moreover, large scale hierarchies with highly dynamic users present serious scalability issues for key management. In this thesis, we deal with key management for content access control. We start by defining building blocks of key management for CACH. Then, we study the existing key management solutions and classify them into two categories -namely, the dependent keys and independent keys approaches - and propose a key management framework for each category. We further propose a generic model to represent independent-keys key management schemes and use this model to define lower bounds on the key management overhead. Then, we propose a new independent-keys key management scheme and prove that it is optimal by showing that it reaches the overhead lower bounds. The optimality of this scheme constitutes one of the most important results of our thesis. Thereafter, we propose new efficient dependent-keys key management schemes and evaluate them by simulations and Markov process modelling. At last, we propose a variant of our schemes allowing to define trade-offs on the performance criteria. We show that this variant offers a means to define very interesting overhead trade-offs
APA, Harvard, Vancouver, ISO, and other styles
5

He, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.

Full text
Abstract:
Au cours de ces dernières années, de plus en plus d’utilisateurs choisissent de diffuser leurs photos sur des plateformes de partage d’images. Ces plateformes permettent aux utilisateurs de restreindre l’accès aux images à un groupe de personnes, afin de donner un sentiment de confiance aux utilisateurs vis-à-vis de la confidentialité de ces images. Malheureusement, la confidentialité ne peut être garantie sachant que le fournisseur de la plateforme a accès aux contenus de n’importe quelle image publiée sur sa plateforme. En revanche, si les images sont mises en ligne chiffrées, seules les personnes ayant la possibilité de déchiffrer les images, auront accès aux images. Ainsi, la confidentialité peut être assurée. Trois principales spécificités sont à prendre en compte lors du chiffrement d’une image : le schéma de chiffrement doit être effectué en respectant le format de l’image (e.g. format JPEG), garantir l’indistinguabilité (l’adversaire ne doit obtenir de l’information sur le contenu de l’image à partir de l’image chiffrée), et doit être compatible avec les traitements des images spécifiques à la plateforme de partage d’images. L’objectif principal de cette thèse a été de proposer un tel schéma de chiffrement pour les images JPEG. Nous avons d’abord proposé et implémenté un schéma de chiffrement garantissant la conservation de l’image et l’indistinguabilité. Malheureusement, nous avons montré que sur Facebook, Instagram, Weibo et Wechat, notre solution ne permettait de maintenir une qualité d’images suffisante après déchiffrement. Par conséquent, des codes correcteurs ont été ajoutés à notre schéma de chiffrement, afin de maintenir la qualité des images<br>In recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
APA, Harvard, Vancouver, ISO, and other styles
6

Gopal, Burra 1968. "Integrating content-based access mechanisms with hierarchical file systems." Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282291.

Full text
Abstract:
We describe a new file system that provides, at the same time, both name and content based access to files. To make this possible, we introduce the concept of a semantic directory. Every semantic directory has a query associated with it. When a user creates a semantic directory, the file system automatically creates a set of pointers to the files in the file system that satisfy the query associated with the directory. This set of pointers is called the query-result of the directory. To access the files that satisfy the query, users just need to de-reference the appropriate pointers. Users can also create files and sub-directories within semantic directories in the usual way. Hence, users can organize files in a hierarchy and access them by specifying path names, and at the same time, retrieve files by asking queries that describe their content. Our file system also provides facilities for query-refinement and customization. When a user creates a new semantic sub-directory within a semantic directory, the file system ensures that the query-result of the sub-directory is a subset of the query-result of its parent. Hence, users can create a hierarchy of semantic directories to refine their queries. Users can also edit the set of pointers in a semantic directory, and thereby modify its query-result without modifying its query or the files in the file system. In this way, users can customize the results of queries according to their personal tastes, and use customized results to refine queries in the future. Our file system has many other features, including semantic mount-points that allow users to access information in other file systems by content. The file system does not depend on the query language used for content-based access. Hence, it is possible to integrate any content-based access mechanism into our file system.
APA, Harvard, Vancouver, ISO, and other styles
7

Pohl, Roland. "Qucosa: Quality Content of Saxony." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-32992.

Full text
Abstract:
Die sächsischen Hochschulbibliotheken verfügten bisher nur über eigene, auf die jeweilige Einrichtung beschränkte Hochschulschriftenserver. Qucosa, das der kostenlosen Publikation und dauerhaften Archivierung von elektronischen Diplomarbeiten, Dissertationen und anderen Veröffentlichungen dient, eröffnet den sächsischen Hochschulbibliotheken neue Perspektiven und bildet eines der Elemente einer „Digitalen Bibliothek“ in Sachsen. Bereits mehrere sächsische Hochschulen und Forschungsinstitute benutzen Qucosa zur Publizierung der eigenen Forschungsergebnisse. Auch nichtwissenschaftliche, staatliche Einrichtungen werden zukünftig ihre Schriften auf Qucosa im Volltext anbieten.
APA, Harvard, Vancouver, ISO, and other styles
8

Hermansson, Rickard, and Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents." Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.

Full text
Abstract:
A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments.This paper shows different systems and models for access control, version control,and distribution of the documents that can be used to create asystem that solves theseproblems.One requirement for this system was a user interface where users can upload, down-load and manage access to their documents. Another requirement was a service thathandles version control for the documents, and a way to quickly connect and distributethe documents. The system also needed to be able to handle access control of the ver-sioned documents on document level, referred to as "fine grained access control" in thispaper.These models and systems were evaluated based on aspects of the access control mod-els, version control systems, and distribution systems andprotocols. After evaluating,appropriate selections were made to create a prototype to test the system as a whole.The prototype ended up meeting the goals that Nordicstationset for the project butonly with basic functionality. Functionality for retrieving any version from a docu-ments history, controlling access for the documents at document level, and a simpleweb based user interface for managing the documents.<br>Att enkelt dela dokument med arbetskollegor är något alla företag har ett behov utav.Ofta är dessa dokument interna och skall hållas inom företaget. Även inom företagetkan det finnas behov av att styra vem som har rätt att läsa ellerrevidera dokumenten.Denna examensarbetesrapport beskriver olika tekniker ochmodeller för accesskon-troll, versionshantering och distribution som kan användas för att implementera ettsystem som kan lösa de nämnda problemen.Ett av kraven för systemet var ett användargränssnitt där användare kan ladda upp ochned sina dokument. Ytterligare krav var att systemet skulleversionshantera dokumenetenoch att användare skall kunna komma åt de olika versionerna.Systemet skulle ocksåkunna hantera åtkomstkontroll på dokumentnivå, något denna examensrapport definerarsom "fine grained access control".För att designa ett sådant system så utredes och utvärderades olika tekniker kringåtkomstkontroll och versionshantering samt distributionav dokumenten. För att testasystemet så utvecklads en prototyp baserad på de valda lösningsmetoderna.Den resulterande prototypen uppfyllde de mål som Nordicstation satte för projektet,dock endast med grundläggande funktionalitet. Stöd för atthämta olika versioner avdokument, kontrollera access till dokumentet nere på dokument nivå och ett webbaseratgränssnitt för att administrera dokumenten.
APA, Harvard, Vancouver, ISO, and other styles
9

Sambra-Petre, Raluca-Diana. "2D/3D knowledge inference for intelligent access to enriched visual content." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917972.

Full text
Abstract:
This Ph.D. thesis tackles the issue of sill and video object categorization. The objective is to associate semantic labels to 2D objects present in natural images/videos. The principle of the proposed approach consists of exploiting categorized 3D model repositories in order to identify unknown 2D objects based on 2D/3D matching techniques. We propose here an object recognition framework, designed to work for real time applications. The similarity between classified 3D models and unknown 2D content is evaluated with the help of the 2D/3D description. A voting procedure is further employed in order to determine the most probable categories of the 2D object. A representative viewing angle selection strategy and a new contour based descriptor (so-called AH), are proposed. The experimental evaluation proved that, by employing the intelligent selection of views, the number of projections can be decreased significantly (up to 5 times) while obtaining similar performance. The results have also shown the superiority of AH with respect to other state of the art descriptors. An objective evaluation of the intra and inter class variability of the 3D model repositories involved in this work is also proposed, together with a comparative study of the retained indexing approaches . An interactive, scribble-based segmentation approach is also introduced. The proposed method is specifically designed to overcome compression artefacts such as those introduced by JPEG compression. We finally present an indexing/retrieval/classification Web platform, so-called Diana, which integrates the various methodologies employed in this thesis
APA, Harvard, Vancouver, ISO, and other styles
10

Sambra-Petre, Raluca-Diana. "2D/3D knowledge inference for intelligent access to enriched visual content." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0012.

Full text
Abstract:
Cette thèse porte sur la catégorisation d'objets vidéo. L'objectif est d'associer des étiquettes sémantiques à des objets 2D présents dans les images/vidéos. L'approche proposée consiste à exploiter des bases d'objets 3D classifiés afin d'identifier des objets 2D inconnus. Nous proposons un schéma de reconnaissance d'objet, conçu pour fonctionner pour des applications en temps réel. La similitude entre des modèles 3D et des contenus 2D inconnu est évaluée à l'aide de la description 2D/3D. Une procédure de vote est ensuite utilisée afin de déterminer les catégories les plus probables de l'objet 2D. Nous proposons aussi une stratégie pour la sélection des vues les plus représentatives d'un objet 3D et un nouveau descripteur de contour (nommé AH). L'évaluation expérimentale a montré que, en employant la sélection intelligente de vues, le nombre de projections peut être diminué de manière significative (jusqu'à 5 fois) tout en obtenant des performances similaires. Les résultats ont également montré la supériorité de l'AH par rapport aux autres descripteurs adoptés. Une évaluation objective de la variabilité intra et inter classe des bases de données 3D impliqués dans ce travail est également proposé, ainsi qu'une étude comparative des approches d'indexations retenues. Une approche de segmentation interactive est également introduite. La méthode proposée est spécifiquement conçu pour surmonter les artefacts de compression tels que ceux mis en place par la compression JPEG. Enfin, nous présentons une plate-forme Web pour l'indexation/la recherche/la classification, qui intègre les différentes méthodologies utilisées dans cette thèse<br>This Ph.D. thesis tackles the issue of sill and video object categorization. The objective is to associate semantic labels to 2D objects present in natural images/videos. The principle of the proposed approach consists of exploiting categorized 3D model repositories in order to identify unknown 2D objects based on 2D/3D matching techniques. We propose here an object recognition framework, designed to work for real time applications. The similarity between classified 3D models and unknown 2D content is evaluated with the help of the 2D/3D description. A voting procedure is further employed in order to determine the most probable categories of the 2D object. A representative viewing angle selection strategy and a new contour based descriptor (so-called AH), are proposed. The experimental evaluation proved that, by employing the intelligent selection of views, the number of projections can be decreased significantly (up to 5 times) while obtaining similar performance. The results have also shown the superiority of AH with respect to other state of the art descriptors. An objective evaluation of the intra and inter class variability of the 3D model repositories involved in this work is also proposed, together with a comparative study of the retained indexing approaches . An interactive, scribble-based segmentation approach is also introduced. The proposed method is specifically designed to overcome compression artefacts such as those introduced by JPEG compression. We finally present an indexing/retrieval/classification Web platform, so-called Diana, which integrates the various methodologies employed in this thesis
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "CONTENT ACCESS"

1

Perry, Brad, John Dinsmore, Shi-Kuo Chang, David Doermann, Azriel Rosenfeld, and Scott Stevens. Content-Based Access to Multimedia Information. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5035-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Helberger, Natali. Controlling access to content: Regulating conditional access in digital broadcasting. Kluwer Law International, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Piotr, Wasilewski. Open content: Zagadnienia prawne. Oficyna Wolters Kluwer Polska, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liang, Lawrence. Guide to open content licenses v1.2. Piet Zwart Institute, Institute for Postgraduate Studies and Research, Willem de Kooning Academy, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rasmussen, Kristi. The Gates public access content server: An easy guide. Bill & Melinda Gates Foundation, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

European Commission. Information Society DG., ed. Access to capital for the content industries: Executive summary. European Commission, Directorate-General for the Information Society, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

author, Jensen Kristi, Salem Joseph A. author, and Association of Research Libraries, eds. Affordable course content and open educational resources. Association of Research Libraries, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

H, Lee Sul, ed. Improved access to information: Portals, content selection, and digital information. Haworth Information Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Center, Electronic Privacy Information, ed. Filters and freedom: Free speech perspective on Internet content controls. The Center, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A, Parham Iris, Poon Leonard W. 1942-, and Siegler Ilene C, eds. ACCESS: Aging curriculum content for education in the social-behavioral sciences. Springer Pub. Co., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "CONTENT ACCESS"

1

Thomas, Jim, and Alan Turner. "Access and Retrieval of Digital Content." In Digital Content Creation. Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0293-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Faloutsos, Christos. "Primary Key Access Methods." In Searching Multimedia Databases by Content. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Faloutsos, Christos. "Secondary Key Access Methods." In Searching Multimedia Databases by Content. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faloutsos, Christos. "Spatial Access Methods (SAMS)." In Searching Multimedia Databases by Content. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faloutsos, Christos. "Access Methods For Text." In Searching Multimedia Databases by Content. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lawless, Séamus, Owen Conlan, and Cormac Hampson. "Tailoring Access to Content." In A New Companion to Digital Humanities. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118680605.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Given, No Author. "Towards Semantic Universal Multimedia Access." In Visual Content Processing and Representation. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39798-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kőrösi, Attila, Balázs Székely, and Miklós Máté. "Modeling the Content Popularity Evolution in Video-on-Demand Systems." In Access Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20931-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mahaffey, Cat, and Ashlyn C. Walden. "Content Development." In ACCESS: Accessible Course Construction for Every Student’s Success. Routledge, 2024. http://dx.doi.org/10.4324/9781003485476-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Borsetti, Diego, Claudio Casetti, Carla-Fabiana Chiasserini, and Luigi Liquori. "Content Discovery in Heterogeneous Mobile Networks." In Heterogeneous Wireless Access Networks. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09777-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CONTENT ACCESS"

1

Likitha, Dasari Sai, and Pooja Vyavahare. "Pricing Strategies for Bundling OTT Content with Internet Access." In 2024 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2024. http://dx.doi.org/10.1109/spcom60851.2024.10631636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yassin, Ghadeer, and Lakshmish Ramaswamy. "CDAC: Content-Driven Access Control Architecture for Smart Farms." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013372000003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mohrehkesh, Shahram, Tamer Nadeem, and Michele C. Weigle. "Context-aware content adaptation in access point." In the 2012 ACM Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2370216.2370384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kalman, Gyorgy, and Josef Noll. "User controlled content access." In 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Younghyun, Haneul Ko, and Sangheon Pack. "Reducing contents access latency in mobile content oriented networks." In 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oluwatimi, Oyindamola, Daniele Midi, and Elisa Bertino. "A Context-Aware System to Secure Enterprise Content." In SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies. ACM, 2016. http://dx.doi.org/10.1145/2914642.2914648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zeng, Wenrong, Yuhao Yang, and Bo Luo. "Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases." In 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Steiner, Moritz, Damiano Carra, and Ernst W. Biersack. "Faster Content Access in KAD." In 2008 Eighth International Conference on Peer-to-Peer Computing (P2P). IEEE, 2008. http://dx.doi.org/10.1109/p2p.2008.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hasan, Kamrul, Chanhong Park, Minsub Lee, and Seong-Ho Jeong. "A cluster-based content access mechanism for Content-Centric Networking." In 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weiss, Duda, and Gifford. "Content-based access to algebraic video." In Proceedings of IEEE International Conference on Multimedia Computing and Systems MMCS-94. IEEE Comput. Soc. Press, 1994. http://dx.doi.org/10.1109/mmcs.1994.292446.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CONTENT ACCESS"

1

Pratt, C., D. Thakore, and B. Stark. HTTP Random Access and Live Content. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levinson, E. Message/External-Body Content-ID Access Type. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zeilenga, K., and J. H. Choi. The Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Bing, Zhijie Wang, Dijiang Huang, and Yan Zhu. Toward Privacy-preserving Content Access Control for Information Centric Networking. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada606547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rosenblat, Sruly, Tim O'Reilly, and Ilan Strauss. Beyond Public Access in LLM Pre-Training Data: Non-public book content in OpenAI’s Models. AI Disclosures Project, Social Science Research Council, 2025. https://doi.org/10.35650/aidp.4111.d.2025.

Full text
Abstract:
Using a legally obtained dataset of 34 copyrighted O’Reilly Media books, we apply the DE-COP membership inference attack method to investigate whether OpenAI’s large language models were trained on copyrighted content without consent. Our AUROC scores show that GPT-4o, OpenAI’s more recent and capable model, demonstrates strong recognition of paywalled O’Reilly book content (AUROC = 82%), compared to OpenAI’s earlier model GPT-3.5 Turbo. In contrast, GPT-3.5 Turbo shows greater relative recognition of publicly accessible O’Reilly book samples. GPT-4o Mini, as a much smaller model, shows no knowledge of public or non-public O’Reilly Media content when tested (AUROC ≈ 0.5). Testing multiple models, with the same cutoff date, helps us account for potential language shifts over time that might bias our findings. These results highlight the urgent need for increased corporate transparency regarding pre-training data sources as a means to develop formal licensing frameworks for AI content training.
APA, Harvard, Vancouver, ISO, and other styles
6

Klosek, Katherine. Copyright and Contracts: Issues and Strategies. Association of Research Libraries, 2022. http://dx.doi.org/10.29242/report.copyrightandcontracts2022.

Full text
Abstract:
In 2020, ARL’s Advocacy and Public Policy Committee launched a digital rights initiative focused on understanding and safeguarding the full stack of research libraries’ rights: to acquire and lend digital content to fulfill libraries’ functions in research, teaching, and learning; to provide accessible works to people with print disabilities; and to fulfill libraries’ collective preservation function for enduring access to scholarly and cultural works. Our objective is to make sure that these rights are well understood by research libraries, by Congress, by the US Copyright Office, and by the courts. This report discusses licenses and contracts for digital content in the context of the US Copyright Act. The report presents advocacy and public policy strategies, such as rights-saving clauses, open access, state strategies, and federal exemptions. The report concludes with next steps, including a test case and ARL strategies.
APA, Harvard, Vancouver, ISO, and other styles
7

Rémy, Elisabeth, Romain Escudier, and Alexandre Mignot. Access impact of observations. EuroSea, 2023. http://dx.doi.org/10.3289/eurosea_d4.8.

Full text
Abstract:
The accuracy of the Copernicus Marine Environment and Monitoring Service (CMEMS) ocean analysis and forecasts highly depend on the availability and quality of observations to be assimilated. In situ observations are complementary to satellite observations that are restricted to the ocean surface. Higher resolution model forecasts are required by users of the CMEMS global and regional ocean analysis and forecasts. To support this with an efficient observational constrain of the model forecast via data assimilation, an increase observation coverage is needed, associated with an improved usage of the available ocean observations. This work exploits the capabilities of operational systems to provide comprehensive information for the evolution of the GOOS. In this report, we analyse the use and the efficiency of the in-situ observations to constrain regional and global Mercator Ocean systems. Physical and biogeochemical variables are considered. The in-situ observations are used either to estimate physical ocean state at global and regional scale via data assimilation or to estimate BGC model parameters. The impact of the physical in situ observations assimilated in open ocean and coastal areas is assessed with numerical data assimilation experiments. The experiments are conducted with the regional 1/36° resolution and global 1/12° resolution systems operated by Mercator Ocean for the Copernicus Marine Service. For the global physical ocean, the focus is on the tropical ocean to better understand how the tropical mooring observations constrain the intraseasonal to daily variability and the complementarity with satellite observations and the deep ocean. The tropical moorings provide unique high frequency observations at different depth, but they are far away from each other, so part of the signal in the observation are decorrelated from one mooring to the others. It is only via an integrated approach, as data assimilation into a dynamical model and complementarity with other observing networks that those observations can efficiently constrain the different scales of variability of the tropical ocean circulation. As the satellite observations brings higher spatial resolution between the tropical moorings but for the ocean surface, we show that the tropical mooring and Argo profile data assimilation constrain the larger scale ocean thermohaline vertical structure (EuroSea D2.2; Gasparin et al., 2023). The representation of the high frequency signals observed at mooring location is also significantly improved in the model analysis compared to a non-assimilative simulation. The ocean below 2000 m depth is still largely under constrained as very few observations exist. Some deep ocean basins, as the Antarctic deep ocean, shows significant trend over the past decade but they are still not accurately monitored. Based on the spread of four deep ocean reanalysis estimates, large uncertainties were estimated in representing local heat and freshwater content in the deep ocean. Additionally, temperature and salinity field comparison with deep Argo observations demonstrates that reanalysis errors in the deep ocean are of the same size as or even stronger than the observed deep ocean signal. OSSE already suggested that the deployment of a global deep Argo array will significantly constrain the deep ocean in reanalysis to be closer to the observations (Gasparin et al., 2020). At regional and coastal scales, the physical ocean circulation is dominated by higher frequency, smaller scale processes than the open ocean which requires different observation strategy to be well monitor. The impact of assimilating high frequency and high-resolution observations provided by gliders on European shelves is analysed with the regional Iberic Biscay and Irish (IBI) system. It was found that repetitive glider sections can efficiently help to constrain the transport of water masses flowing across those sections. BGC ocean models are less mature than physical ocean models and some variable dependencies are still based on empirical functions. In this task, Argo BGC profile observations were used to optimize the parameters of the global CMEMS biogeochemical model, PISCES. A particle filter algorithm was chosen to optimize a 1D configuration of PISCES in the North Atlantic. The optimization of the PISCES 1D model significantly improves the model's ability to reproduce the North Atlantic bloom Recommendations on the in-situ network extensions for real time ocean monitoring are given based on those results, and the one also obtained in the WP2, Task 2.2 where data assimilation experiments but with simulated observations where conducted. Argo extension and the complementarity with satellite altimetry was also extensively studied. (EuroSea Deliverable ; D4.8)
APA, Harvard, Vancouver, ISO, and other styles
8

Serafica, Ramonette, and Queen Cel Oren. Should the Philippines Adopt Net Neutrality Regulations? Philippine Institute for Development Studies, 2024. http://dx.doi.org/10.62986/pn2024.08.

Full text
Abstract:
Net neutrality is a contentious issue in internet regulation, looking at nondiscrimination and pricing policy. It espouses the idea that broadband service providers should charge consumers only once for internet access, not favor one content provider over another, and not charge content providers for sending information over broadband lines to end users. Advocates argue that this fosters innovation and protects freedom of expression, while critics warn that it could stifle investment and innovation. This paper examines the advantages and disadvantages of adopting net neutrality principles in the proposed Open Access in Data Transmission Act. While net neutrality can address legal obstacles, infrastructure gaps, and network discrimination, its unintended impacts on investment and innovation remain ambiguous. Thus, policymakers are advised to identify the public interest at stake, consider existing competition regulations and consumer protection laws, and assess possible impacts on the internet value chain. Also recommended is the elimination of barriers to entry and other restrictions within the internet access connectivity segment of the internet value chain.
APA, Harvard, Vancouver, ISO, and other styles
9

Mintii, I. S. Using Learning Content Management System Moodle in Kryvyi Rih State Pedagogical University educational process. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3866.

Full text
Abstract:
The article analyzes the results of the survey of 75 lecturers on using learning content management system (LCMS) Moodle in the educational process. It is defined that more than 75% of the respondents use LCMS Moodle. The lecturers up to 30 or over 60 years old, with up to 3-year-work experience in Universities need methodic assistance. Textual e-learning resources are widely used in developed courses while video and audio are not used enough. LCMS Moodle is mostly used during exams or tests and student work, and using LCMS Moodle should be intensified in lectures, laboratory and practical classes. Among the most demanded resources are label, page, file, URL, book, assignment, attendance, glossary, quiz. Thus, the popularization of other resources is identified as one of the most important. An action plan how to improve LCMS Moodle usage: increasing the IT competencies of both teachers and students – planned long-term courses “IT in full-time (blended) learning”; seminars, consultations, (group and individual forms) both on general issues, and according to the specificity of the specialties; methodic handouts and recommendations; improving logistics; improving logistical support – ensuring constant access to the Internet, updating and equipping computer classrooms; creating of transparent, predictable and attractive for authors content of the regulatory framework.
APA, Harvard, Vancouver, ISO, and other styles
10

Groeneveld, Caspar, Elia Kibga, and Tom Kaye. Deploying an e-Learning Environment in Zanzibar: Feasibility Assessment. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0028.

Full text
Abstract:
The Zanzibar Ministry of Education and Vocational Training (MoEVT) and the World Bank (the Bank) approached the EdTech Hub (the Hub) in April 2020 to explore the feasibility of implementing a Virtual Learning Environment (VLE). The Hub was requested to focus primarily on the deployment of a VLE in lower secondary education, and this report consequently focuses primarily on this group. The report is structured in four sections: An introduction to provide the background and guiding principles for the engagement with a short overview of the methodology applied. An analysis of the Zanzibar education system with a particular focus on elements relevant to deploying a VLE. This includes the status of ICT infrastructure, and a summary of the stakeholders who will play a role in using or implementing a VLE. A third section that discusses types of VLEs and content organisation, and their applicability to the Zanzibar ecosystem. A conclusion with recommendations for Zanzibar, including short- and long-term steps. In this collaboration with Zanzibar’s MoEVT, the Hub team sought to understand the purpose of the proposed VLE. Based on discussions and user scenarios, we identified two main education challenges a VLE may help to resolve. In the short term, students cannot go to school during the COVID-19 crisis, but need access to educational content. There is content, but no flexible and versatile platform to disseminate content to all students. In the long term, a mechanism to provide students with access to quality, curriculum-aligned content in school, or remotely, is required.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!