Academic literature on the topic 'Download data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Download data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Download data"
Gurney, Jennifer M., Leopoldo C. Cancio, Michael Remley, Stacy Shackelford, and Rachel Rhodes. "557 Use of Online Clinical Guidelines for Burn Care in the Deployed Environment: A Model for Care in Rural or Remote Locations." Journal of Burn Care & Research 41, Supplement_1 (March 2020): S119. http://dx.doi.org/10.1093/jbcr/iraa024.185.
Full textPenfold, Gerry. "Micro CAATs: Practical data download." Computer Audit Update 1990, no. 3 (January 1990): 17–19. http://dx.doi.org/10.1016/s0960-2593(05)80045-x.
Full textTaufiq, Rohmat, Angga Pradipta, Ri Sabti Septarini, and Andhika Aratida Priadi. "ANALISIS DATA FLIGHT OPERATION QUALITY ASSURANCE (FOQA) GARUDA INDONESIA BERBASIS WEB DI PT. GMF AEROASIA TBK." JIKA (Jurnal Informatika) 5, no. 1 (February 28, 2021): 84. http://dx.doi.org/10.31000/jika.v5i1.4130.
Full textSingson, Mangkhollen, S. Thiyagarajan, and M. Leeladharan. "Relationship between electronic journal downloads and citations in library consortia." Library Review 65, no. 6/7 (September 5, 2016): 429–44. http://dx.doi.org/10.1108/lr-02-2016-0019.
Full textSoltis, Pamela. "Data Attribution from Download to Publication." Biodiversity Information Science and Standards 2 (May 18, 2018): e26060. http://dx.doi.org/10.3897/biss.2.26060.
Full textAktas, Mehmet Fatih, Elie Najm, and Emina Soljanin. "Simplex Queues for Hot-Data Download." ACM SIGMETRICS Performance Evaluation Review 44, no. 1 (June 5, 2017): 35–36. http://dx.doi.org/10.1145/3143314.3078553.
Full textSmith, A. V. "Retrieving HapMap Data via Bulk Download." Cold Spring Harbor Protocols 2008, no. 8 (July 1, 2008): pdb.prot5027. http://dx.doi.org/10.1101/pdb.prot5027.
Full textAl-Jaroodi, Jameela, Nader Mohamed, and Abdulla Eid. "Dual direction big data download and analysis." ACM SIGMETRICS Performance Evaluation Review 41, no. 4 (April 17, 2014): 98–101. http://dx.doi.org/10.1145/2627534.2627564.
Full textPradono, K. A., Y. D. Safitri, B. S. Adhitama, Y. F. Hestrio, M. Soleh, H. Gunawan, N. Widijatmiko, and W. Sunarmodo. "Development of automatic Landsat data download engine." IOP Conference Series: Materials Science and Engineering 1007 (December 31, 2020): 012109. http://dx.doi.org/10.1088/1757-899x/1007/1/012109.
Full textVu, Long, Klara Nahrstedt, Rahul Malik, and Qiyan Wang. "COADA." International Journal of Adaptive, Resilient and Autonomic Systems 2, no. 2 (April 2011): 1–22. http://dx.doi.org/10.4018/jaras.2011040101.
Full textDissertations / Theses on the topic "Download data"
Chen, Yingyong. "Maximizing data download capabilities for future constellation space missions." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1730.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ieong, Sze-Chung Ricci. "Dispute resolution against copyright infringement through internet download?" access abstract and table of contents access full-text, 2007. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?ma-slw-b21844173a.pdf.
Full text"Master of Arts in arbitration and dispute resolution dissertation, City University of Hong Kong" Title from PDF t.p. (viewed on May 22, 2007) Includes bibliographical references.
Chowdhury, H. (Helal). "Data download on the move in visible light communications:design and analysis." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213620.
Full textTiivistelmä Näkyvään valoon pohjautuvassa tiedonsiirrossa (VLC) valodiodeja (LED) käytetään lähettiminä, ilma on siirtokanava ja valoilmaisimia käytetään vastaanottimina. Tätä kutsutaan usein nimellä light fidelity (Li-Fi). Tässä työssä tarjoamme menetelmiä VLC ”hotspot” verkkojen suorituskyvyn arviointiin tiedonsiirtonopeus-etäisyysmalleilla skenaarioissa, jossa tietoa ladataan liikkeessä. Tässä kontekstissa tutkimme ensin optisen lähettimen komponenttien eri ominaisuuksia, kohinan lähteitä, keinovalon häiriömalleja ja tiedonsiirtolinkkien topologioita, jonka jälkeen esittelemme tiedonsiirtonopeuden ja etäisyyden välisen mallin. Toiseksi kehitetyn analyyttisen tiedonsiirto-etäisyys mallia käytetään arvioitaessa VLC hotspot verkkojen suorituskykyä sisäympäristössä sekä päivä että yö olosuhteissa. Simulointien tulokset osoittavat, että taustakohinalla on suuri vaikutus VLC verkkojen suorituskykyyn. Kuten odotettua, sisä- ja ulkotiloissa VLC hotspot toimii paremmin yöllä kuin päivällä. VLC hotspot verkkojen suorituskyky arvioidaan myös vastaanotetun tiedoston koon, eri bittivirhesuhteen vaatimuksilla ja liikkuvan käyttäjän nopeuden suhteen. Kolmanneksi tutkimme hybridi WLAN-VLC hotspot verkon suorituskykyä ja vertaamme sen suorituskykyä pelkän VLC- tai WLAN hotspot tapauksessa. Käsittelemme myös skenaarioita jossa tiedoston lataus tapahtuu liikkeessä sisätilassa yhden käyttäjän sekä monen käyttäjän tapauksissa. Tässä hybridi WLAN-VLC hotspot, sekä erilliset WLAN- ja VLC verkot ovat määritelty niiden tiedonsiirtonopeuden ja kantaman perusteella. Näiden verkkojen suorituskykyä arvioitaessa on tehty joukko tietokonesimulointeja verkossa tapahtuvasta tietojen lataamisesta liikkeessä ottamalla huomioon suorituskyvyn mittarit kuten tiedoston koko, keskimääräinen yhteyden kesto ja saavutettu läpäisy. Simuloinnin tulokset paljastavat, että hybridi WLAN-VLC toimii aina paremmin kuin pelkkä VLC tai WLAN hotspot sekä yhden että monen käyttäjän tapauksessa. Lopuksi työssä analysoidaan ehdotetun järjestelmän toteutettavuus ja mahdolliset edut käytettäessä hybridejä radio-optisia langattomia järjestelmiä. Tältä osin esitellään myös kooperatiiviseen viestintään perustuvat optiset releet parantamaan verkon kattavuutta ja energiatehokkuutta akkukäyttöisissä laitteissa. Mahdolliset hyödyt tunnistetaan palvelun konnektiivisuudessa ja energiatehokkuudessa akkukäyttöisissä laitteissa sisätiloissa. Simulointien tulokset osoittavat, että käyttäjien konnektiivisuus ja energiatehokkuus riippuvat käyttäjätiheydestä, kantaman ja etäisyyden välisestä suhteesta yhden hypyn ja monen hypyn välillä, releointi todennäköisyydestä ja käyttäjien mobiliteetista
Opitz, Andrea. "Stereo plastic calibration, simulation and data analysis /." [S.l.] : [s.n.], 2007. http://www.zb.unibe.ch/download/eldiss/07opitz_a.pdf.
Full textGerber, Manuel. "Predictive site detection and reconstruction a data-driven approach to the detection, analysis, reconstruction and excavation of ancient Near Eastern monumental architecture /." Bern : Selbstverl, 2003. http://www.zb.unibe.ch/download/eldiss/03gerber_m.pdf.
Full textHopkins, Ashley R. "Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.
Full textCanali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.
Full textThe incredible growth of the World Wide Web has allowed society to create new jobs, marketplaces, as well as new ways of sharing information and money. Unfortunately, however, the web also attracts miscreants who see it as a means of making money by abusing services and other people's property. In this dissertation, we perform a multidimensional analysis of attacks involving malicious or compromised websites, by observing that, while web attacks can be very complex in nature, they generally involve four main actors. These are the attackers, the vulnerable websites hosted on the premises of hosting providers, the web users who end up being victims of attacks, and the security companies who scan the Internet trying to block malicious or compromised websites. In particular, we first analyze web attacks from a hosting provider's point of view, showing that, while simple and free security measures should allow to detect simple signs of compromise on customers' websites, most hosting providers fail to do so. Second, we switch our point of view on the attackers, by studying their modus operandi and their goals in a distributed experiment involving the collection of attacks performed against hundreds of vulnerable web sites. Third, we observe the behavior of victims of web attacks, based on the analysis of their browsing habits. This allows us to understand if it would be feasible to build risk profiles for web users, similarly to what insurance companies do. Finally, we adopt the point of view of security companies and focus on finding an efficient solution to detecting web attacks that spread on compromised websites, and infect thousands of web users every day
Henneberger, Sabine. "Entwicklung einer Analysemethode für Institutional Repositories unter Verwendung von Nutzungsdaten." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2011. http://dx.doi.org/10.18452/16399.
Full textWith the spread of internet usage over the past decades, access characteristics of electronic scientific publica-tions, especially the number of document downloads, are of increasing interest to the authors, publishers, technical providers and users of such publications. These download data of publications are usually obtained from the protocols of the IT systems of the provider. A data set is then created by filtering all accesses and subsequent summarizing over a certain time unit. Download data are the subject of scientific investigations, in which the concept of the Citation Impact is applied to the rate of use of a publication and the so-called Download Impact is formed. Special attention is paid to the relation between Citation Impact and Download Impact. In the case of Open Access publications, two types of access need to be distinguished. Human access and machine access are both captured and a reliable distinction is not possible yet. As a result, the data obtained for single publications are unreliable and subject to strong fluctuations. Nevertheless, they contain valuable information that can be made useful with the help of mathematical statistics. Analyzed with nonparametric methods, download data give information about the visibility of electronic publications on the Internet. These methods form the core of NoRA (Non-parametric Repository Analysis). With the help of NoRA, the operators of Open Access Repositories are able to analyze the download data of their electronic publications, to identify and correct deficiencies of visibility and to increase the quality of their online platform. The analytical method NoRA was successfully applied to data from Institutional Repositories of four universities. In each case, groups of publications were identified that differed significantly in their usage. Similarities in the results reveal factors that influence the usage data, which have not been taken into account previously. The presented results imply further applications of NoRA but also raise doubts about the value of download data of single publications.
Jílek, Radim. "Služba pro ověření spolehlivosti a pečlivosti českých advokátů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363772.
Full textSchäppi, Eggler Rodolpha. "Laufbahnberatung up to date - Ein modernes Internet-Tool ergänzt traditionelle bewährte Methoden /." Zürich, 2004. http://www.zhaw.ch/fileadmin/user_upload/psychologie/Downloads/Bibliothek/Arbeiten/D/d1829.pdf.
Full textBooks on the topic "Download data"
Schneider, Jörg, and Ton Vrouwenvelder. Introduction to safety and reliability of structures. 3rd ed. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 1997. http://dx.doi.org/10.2749/sed005.
Full textBertrand-Krajewski, Jean-Luc, Francois Clemens-Meyer, and Mathieu Lepot, eds. Metrology in Urban Drainage and Stormwater Management: Plug and Pray. IWA Publishing, 2021. http://dx.doi.org/10.2166/9781789060119.
Full textCarrano, Frank M. Data Structures and Abstractions with Java (2-Downloads). Pearson Education, Limited, 2012.
Find full textPeacock, Janet L., Sally M. Kerry, and Raymond R. Balise. Presenting Medical Statistics from Proposal to Publication. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198779100.001.0001.
Full textMercer, Dave, and Russell Shaw. Caution! Music & Video Downloading: Your Guide to Legal, Safe, and Trouble-Free Downloads. Wiley, 2004.
Find full textSilvester, Trevor. How to Click: How to Date and Find Love with Confidence - Contains Free Audio Downloads. Hodder & Stoughton, 2016.
Find full textProcyshyn, Ric M., Kalyna Z. Bezchlibnyk-Butler, and J. Joel Jeffries, eds. Clinical Handbook of Psychotropic Drugs. Hogrefe Publishing, 2021. http://dx.doi.org/10.1027/00593-000.
Full textHodges, John R. The Addenbrooke’s Cognitive Examination: Revised and Supplementary Test Suggestions. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198749189.003.0007.
Full textPractical R for biologists: an introduction. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789245349.0000.
Full textBook chapters on the topic "Download data"
Kaufmann, Uwe H., and Amy B. C. Tan. "Zusatzmaterial zum Download." In Data Science für Einsteiger, 399–400. München: Carl Hanser Verlag GmbH & Co. KG, 2020. http://dx.doi.org/10.3139/9783446466777.022.
Full textDi Lorenzo, Renato. "How to Download the Data." In Perspectives in Business Culture, 129–30. Milano: Springer Milan, 2012. http://dx.doi.org/10.1007/978-88-470-2534-9_27.
Full textGao, Rui, Yanyun Nian, Lu Chen, and Qingguo Zhou. "An EF6 Code-First Approach Using MVC Architecture Pattern for Watershed Data Download, Visualization and Analysis System Development Based on CUAHSI-HIS." In Lecture Notes in Electrical Engineering, 459–70. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0539-8_46.
Full textBreidert, Christoph, and Michael Hahsler. "Adaptive Conjoint Analysis for Pricing Music Downloads." In Studies in Classification, Data Analysis, and Knowledge Organization, 409–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-70981-7_46.
Full textKirstein, Fabian, Dario Bacher, Vincent Bohlen, and Sonja Schimmler. "Ronda: Real-Time Data Provision, Processing and Publication for Open Data." In Lecture Notes in Computer Science, 165–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84789-0_12.
Full textRao, Fabrizio. "Using Domiciliary Noninvasive Ventilator Data Downloads to Inform Clinical Decision-Making to Optimize Ventilation Delivery and Patient Compliance." In Noninvasive Ventilation in Sleep Medicine and Pulmonary Critical Care, 103–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42998-0_12.
Full textAldwairi, Monther, Musaab Hasan, and Zayed Balbahaith. "Detection of Drive-by Download Attacks Using Machine Learning Approach." In Cognitive Analytics, 1598–611. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2460-2.ch082.
Full textLim, Say Ying, David Taniar, and Bala Srinivasan. "Data Caching in a Mobile Database Environment." In Business Data Communications and Networking, 187–210. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch008.
Full text"Analyzing Survey Data: Describing Relationships Among Variables." In Practical Research Methods for Nonprofit and Public Administrators, Instructor's Manual (Download only), 143–58. Routledge, 2016. http://dx.doi.org/10.4324/9781315508450-16.
Full textSingh, Vijander, Amit Kumar Bairwa, and Deepak Sinwar. "An Analysis of Big Data Analytics." In Advances in Environmental Engineering and Green Technologies, 203–30. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5003-8.ch011.
Full textConference papers on the topic "Download data"
Koone, Mary E., and Ramez Elmasri. "Public Datasets: Access, Download and Cleaning (AWS)." In DATA'21: International Conference on Data Science, E-learning and Information Systems 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460620.3460633.
Full textAktas, Mehmet Fatih, Elie Najm, and Emina Soljanin. "Simplex Queues for Hot-Data Download." In SIGMETRICS '17: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3078505.3078553.
Full textKaiser, Jurgen, Dirk Meister, Viktor Gottfried, and Andre Brinkmann. "MCD: Overcoming the Data Download Bottleneck in Data Centers." In 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS). IEEE, 2013. http://dx.doi.org/10.1109/nas.2013.18.
Full textDandapat, Sourav Kumar, Ravi Niranjan, and Niloy Ganguly. "Framework for Collaborative Download in Wireless Mobile Environment." In 2012 13th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2012. http://dx.doi.org/10.1109/mdm.2012.30.
Full textLiang, Zhipeng, Lixiang Liu, Joshua Wilson Jiang, Jian Guo, Yahang Zhang, and Hongcheng Yan. "Data relay system data download scheduling algorithm for earth observation satellites." In 2017 IEEE International Conference on Communication, Networks and Satellite (Comnetsat). IEEE, 2017. http://dx.doi.org/10.1109/comnetsat.2017.8263566.
Full textSelvi, S. Kalai, and K. Dinakaran. "Minimization of data download by G-Node dissemination method." In 2014 International Conference on Computer Communication & Systems (ICCCS). IEEE, 2014. http://dx.doi.org/10.1109/icccs.2014.7068203.
Full textAbdelli, Abdelkrim, and Nadjib Badache. "Efficient Bandwidth and Buffer Management for Multimedia Data Download." In Future Generation Communication and Networking (FGCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/fgcn.2007.113.
Full textWang, Shijie, Shengbin Lin, Jizhong Zhang, Yongjun Gu, and Yu Zhao. "A Coordinate Scheduling of EOS Observation and Data Download." In 2020 IEEE 20th International Conference on Communication Technology (ICCT). IEEE, 2020. http://dx.doi.org/10.1109/icct50939.2020.9295785.
Full textLiu, Ke, Vaneet Aggarwal, Ziyu Shao, and Mingyu Chen. "Joint Upload-Download TCP Acceleration over Mobile Data Networks." In 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, 2017. http://dx.doi.org/10.1109/sahcn.2017.7964931.
Full textAstudilloy, Darwin, Emmanuel Chaput, and Andre-Luc Beylot. "PRAVDA: Pseudo random network coding in vanet for data download." In 2014 Wireless Days (WD). IEEE, 2014. http://dx.doi.org/10.1109/wd.2014.7020833.
Full textReports on the topic "Download data"
Duran, A., E. Burton, K. Kelly, and K. Walkowicz. Fleet DNA Project - Data Dictionary for Public Download Files. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1158422.
Full textMartínez Villarreal, Déborah, Cristina Parilli, Ana María Rojas Méndez, Carlos Scartascini, and Alberto Simpser. Research Insights: Indirect Strategies Might Be a Better Way to Address Data Privacy Issues. Inter-American Development Bank, April 2021. http://dx.doi.org/10.18235/0003213.
Full textYoung, Fran, Jϋrgen Wiehn, David Gothard, Eric Southam, Christopher Winchester, Paul Farrow, and Christopher Rains. Trends in digital access to congress presentations: what can we learn from 4 years of download data? Oxford PharmaGenesis Ltd., April 2017. http://dx.doi.org/10.21305/ismppus2017.001.
Full textRuderman, Marian, and Cathleen Clerkin. The Quantified Leader: Wearables & Self-Tracking Technology for Development. Center for Creative Leadership, 2019. http://dx.doi.org/10.35613/ccl.2019.2052.
Full textOBrien, Patrick, Kenning Arlitsch, Leila Sterman, Jeff Mixter, Jonathan Wheeler, and Susan Borda. Data set supporting study on Undercounting File Downloads from Institutional Repositories [dataset]. Montana State University ScholarWorks, 2016. http://dx.doi.org/10.15788/m2z59n.
Full textVélez-Velásquez, Juan Sebastián. Banning Price Discrimination under Imperfect Competition: Evidence from Colombia's Broadband. Banco de la República de Colombia, December 2020. http://dx.doi.org/10.32468/be.1148.
Full textMarcos Barba, Liliana, Hilde van Regenmortel, and Ellen Ehmke. Shelter from the Storm: The global need for universal social protection in times of COVID-19. Oxfam, December 2020. http://dx.doi.org/10.21201/2020.7048.
Full textOver, Thomas, Riki Saito, Andrea Veilleux, Padraic O’Shea, Jennifer Sharpe, David Soong, and Audrey Ishii. Estimation of Peak Discharge Quantiles for Selected Annual Exceedance Probabilities in Northeastern Illinois. Illinois Center for Transportation, June 2016. http://dx.doi.org/10.36501/0197-9191/16-014.
Full text