Academic literature on the topic 'End-To-End'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'End-To-End.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "End-To-End"

1

G, Shravya, and Prof Smitha G R. "CMRepo End-to-End Automation." International Journal of Innovative Research in Computer Science & Technology 7, no. 3 (May 2019): 79–83. http://dx.doi.org/10.21276/ijircst.2019.7.3.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Wiback, and Hosung Nam. "End-to-end non-autoregressive fast text-to-speech." Phonetics and Speech Sciences 13, no. 4 (December 2021): 47–53. http://dx.doi.org/10.13064/ksss.2021.13.4.047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abirami, N., M. Sri Nivetha, and S. Veena. "End to End Encryption using QKD Algorithm." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (October 31, 2018): 936–39. http://dx.doi.org/10.31142/ijtsrd18723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Mingyu, Hyeonseok Kim, and Seongkeun Park. "End-to-End autonomous driving based on Convolutional Recurrent Neural Network." Journal of Korean Institute of Intelligent Systems 29, no. 4 (August 31, 2019): 297–301. http://dx.doi.org/10.5391/jkiis.2019.29.4.297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Kihun, Cheonum Park, Changki Lee, and Hyunki Kim. "Korean End-to-end Neural Coreference Resolution with BERT." Journal of KIISE 47, no. 10 (October 31, 2020): 942–47. http://dx.doi.org/10.5626/jok.2020.47.10.942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, June-Woo, and Ho-Young Jung. "End-to-end speech recognition models using limited training data*." Phonetics and Speech Sciences 12, no. 4 (December 2020): 63–71. http://dx.doi.org/10.13064/ksss.2020.12.4.063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, June-Woo, and Ho-Young Jung. "End-to-end speech recognition models using limited training data*." Phonetics and Speech Sciences 12, no. 4 (December 2020): 63–71. http://dx.doi.org/10.13064/ksss.2020.12.4.063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Kihun, Cheonum Park, Changki Lee, and Hyunki Kim. "Korean End-to-End Neural Coreference Resolution Using Higher-Order Inference." KIISE Transactions on Computing Practices 26, no. 5 (May 31, 2020): 250–55. http://dx.doi.org/10.5626/ktcp.2020.26.5.250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jo, Kyeongbin, Youngjun Jung, Changki Lee, Jihee Ryu, and Joonho Lim. "Korean End-to-End Coreference Resolution with BERT for Long Document." Journal of KIISE 50, no. 1 (January 31, 2023): 32–39. http://dx.doi.org/10.5626/jok.2023.50.1.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rieck, Steffi, Joachim Heidelbach, and Tobias Stahl. "End-to-End- Prozessautomatisierung/End-to-end process automation." wt Werkstattstechnik online 113, no. 01-02 (2023): 42–47. http://dx.doi.org/10.37544/1436-4980-2023-01-02-46.

Full text
Abstract:
Durchgängige, automatisierte Prozesse können Prozesskosten um 30 bis 40 Prozent senken und Durchlaufzeiten signifikant verkürzen. Der vorliegende Beitrag zeigt anhand eines siebenstufigen Vorgehens, wie automatisierte Prozesse umgesetzt werden. Dazu werden die Stufen (wie Aufnahme, Optimierung, Automatisierung und Monitoring) inklusive möglicher Methoden und Technologien dargestellt. Neben Robotic Process Automation (RPA) kommen hierbei Process Mining und Methoden der künstlichen Intelligenz (KI) zum Einsatz. Continuous, automated processes allow for reducing process costs by 30 to 40 percent and for significantly shortening lead times. A seven-stage approach shows how to put automated processes into practice. This paper presents the individual stages (such as recording, optimization, automation, and monitoring), including possible methods and technologies. To automate processes, Robotic Process Automation (RPA), process mining, and artificial intelligence (AI) technologies are used.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "End-To-End"

1

Li, Jizhizi. "End-to-end Animal Matting." Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/22897.

Full text
Abstract:
Image matting is a widely studied low-level vision problem that aims to provide a detailed foreground alpha matte from a single image, benefiting a wide range of downstream applications. However, most of the prevalent matting models are requiring extra manual intervention such as trimap or scribble. Besides, the lack of large-scale real-world annotated data has also caused poor generalizability in learned deep models. In this paper, we propose a novel end-to-end matting method called GFM along with a real-world, high-quality, category-wised animal matting dataset called AM-2k to address the above issues. The proposed end-to-end matting model GFM is short for Glance and Focus Matting Network, aims to conduct simultaneously trimap generation and matting by sharing one encoder and going through different decoders in separate branches. The design of GFM can help extract local and global information within one stage training process. Without the need for any extra input, GFM surpasses the previous state-of-the-art in performance on all evaluation metrics. Our proposed AM-2k consists of 20 categories mammals animals and 200 high-quality image for each category. We manually generate accurate mattes for each of them. Based on this dataset, we also set up three evaluation tracks, MIX-Track, DA-Track and CW-Track which can benefit the research on end-to-end matting, trimap-based matting, domain adaptation for matting and few shot learning. Extensive experiments and comprehensive analysis are performed on the AM-2k dataset to validate the effectiveness of GFM and its superiority over representative state-of-the-art methods. Various visual results can be found in Chapter 4 and Appendix.
APA, Harvard, Vancouver, ISO, and other styles
2

Rangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaves 53-54).
by Vinod K. Rangarajan.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, William. "End-to-End Speech Recognition Models." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/723.

Full text
Abstract:
For the past few decades, the bane of Automatic Speech Recognition (ASR) systems have been phonemes and Hidden Markov Models (HMMs). HMMs assume conditional indepen-dence between observations, and the reliance on explicit phonetic representations requires expensive handcrafted pronunciation dictionaries. Learning is often via detached proxy problems, and there especially exists a disconnect between acoustic model performance and actual speech recognition performance. Connectionist Temporal Classification (CTC) character models were recently proposed attempts to solve some of these issues, namely jointly learning the pronunciation model and acoustic model. However, HMM and CTC models still suffer from conditional independence assumptions and must rely heavily on language models during decoding. In this thesis, we question the traditional paradigm of ASR and highlight the limitations of HMM and CTC models. We propose a novel approach to ASR with neural attention models and we directly optimize speech transcriptions. Our proposed method is not only an end-to- end trained system but also an end-to-end model. The end-to-end model jointly learns all the traditional components of a speech recognition system: the pronunciation model, acoustic model and language model. Our model can directly emit English/Chinese characters or even word pieces given the audio signal. There is no need for explicit phonetic representations, intermediate heuristic loss functions or conditional independence assumptions. We demonstrate our end-to-end speech recognition model on various ASR tasks. We show competitive results compared to a state-of-the-art HMM based system on the Google voice search task. We demonstrate an online end-to-end Chinese Mandarin model and show how to jointly optimize the Pinyin transcriptions during training. Finally, we also show state-of-the-art results on the Wall Street Journal ASR task compared to other end-to-end models.
APA, Harvard, Vancouver, ISO, and other styles
4

Le, BeEm V. "Distributed and end-to-end testing." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLe.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering Management)--Naval Postgraduate School, December 2009.
Thesis Advisor: Huynh, Thomas V. Second Reader: Barrera, Raymond. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: distributed, End-to-End, combat systems, C4I Systems, pay-per-test, Goal Programming (GP), Distributed Engineering Plant (DEP), E2E Lab, PMW, PEO C4I, NAVSEA, SPAWAR. Includes bibliographical references (p. 53-54). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Chaudry, Kashif, and Elma Karadza. "End-to-End Application Billing in 3G." Thesis, Linköping University, Department of Science and Technology, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1654.

Full text
Abstract:

We have 3G on the doorstep but nothing seems to attract ordinary people to this technology. To attract the mass market the telecom industry must show something beyond high bit rates. They must show how ordinary people can take advantage of this new technology. This is done by showing the possibilities of the new technology and by demonstrating applications that it will handle. The telecom industry must convince the telecom operators to invest in this technology and the only thing that matters to them is how much revenue they can make by adopting the upcoming technology.

To convince the operators industry must show how the operators can charge for the new types of applications that will be introduced soon. This is the main reason why this Master's Thesis has been conducted. The purpose of this thesis is to provide a demonstration to Ericsson's 3G lab in Katrineholm in the form of an IP application with a billing solution. This thesis describes the migration from 1G to 3G and examines existing and future billing strategies as well.

The IP application is an application that uses progressive streaming in order to stream multimedia content to a PDA connected to a 3G phone. This application is platform independent because it is placed on leading Web servers, Apache and IIS.

The billing application consists of a number of steps. The first step is logging, which is performed by the Web server on which the streaming application is placed. The second step, processing and billing, is performed in the BGw, which is Ericsson's mediation tool, and the SQL server.The third step is displaying the bill, which is done by using ASP to create an active HTML page.

APA, Harvard, Vancouver, ISO, and other styles
6

Holmström, Maria. "End-to-end monitoring of mobile services." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1671.

Full text
Abstract:

The growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests.

This thesis presents a solution to how the part of an end-to-end monitoring system for mobile services that runs on a mobile phone can be designed and implemented. The phone is made to interpret commands from a control process on a remote server and turn them into mobile service requests in a proper format (e.g. SMS or MMS). When it receives the reply from a mobile service provider, it forwards the relevant result information to the control process.

The monitoring system is based on Symbian OS, an operating system developed to suit handheld devices like mobile phones. The current implementation supports tests for SMS and MMS services.

The system is to be used by mobile operators or other providers of mobile services, which want to test and monitor their services.

APA, Harvard, Vancouver, ISO, and other styles
7

Lazar, Mihai. "Empirical modeling of end-to-end jitter." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0019/MQ58472.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brown, Ian. "End-to-end security in active networks." Thesis, University College London (University of London), 2001. http://discovery.ucl.ac.uk/3882/.

Full text
Abstract:
Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea.
APA, Harvard, Vancouver, ISO, and other styles
9

Maaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Da. "End to end testing using integrated tools." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338300180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "End-To-End"

1

End to end. Long Preston: Dales Large Print Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bergsmann, Stefan. End-to-End-Geschäftsprozessmanagement. Vienna: Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0840-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Diane, McMichael Gilster, ed. Bluetooth end to end. New York, NY: M&T Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bill, Mann, ed. Wireless devices end to end. New York, NY: Hungry Minds, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1952-, Tabernero Antonio, ed. Madrid: From end to end. Madrid: Ediciones Aldeasa, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

End-to-end DSL architectures. Indianapolis, IN: Cisco Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Olmedo, Fernando. Andaluci a from end to end. Madrid]: Aldeasa, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Christina, Hattingh, ed. End-to-end qos network design. Indianapolis, IN: Cisco Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hannan, J. N. To the end. Narara, NSW: C.J. & I.M. Hannan, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

To the end. New York: Mysterious Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "End-To-End"

1

Bergsmann, Stefan. "Einleitung." In End-to-End-Geschäftsprozessmanagement, 1–9. Vienna: Springer Vienna, 2012. http://dx.doi.org/10.1007/978-3-7091-0840-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bergsmann, Stefan. "End-to-End-Verständnis von Geschäftsprozessen." In End-to-End-Geschäftsprozessmanagement, 11–105. Vienna: Springer Vienna, 2012. http://dx.doi.org/10.1007/978-3-7091-0840-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bergsmann, Stefan. "Prozessmanagement als Organisationselement." In End-to-End-Geschäftsprozessmanagement, 107–65. Vienna: Springer Vienna, 2012. http://dx.doi.org/10.1007/978-3-7091-0840-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bergsmann, Stefan. "Prozessmanagement als Integrationsinstrument." In End-to-End-Geschäftsprozessmanagement, 167–96. Vienna: Springer Vienna, 2012. http://dx.doi.org/10.1007/978-3-7091-0840-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bergsmann, Stefan. "Prozessmanagement als Managementansatz." In End-to-End-Geschäftsprozessmanagement, 197–254. Vienna: Springer Vienna, 2012. http://dx.doi.org/10.1007/978-3-7091-0840-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bergsmann, Stefan. "Zusammenfassung und Ausblick." In End-to-End-Geschäftsprozessmanagement, 255–59. Vienna: Springer Vienna, 2012. http://dx.doi.org/10.1007/978-3-7091-0840-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cole, Robert. "End-to-end Services." In Computer Communications, 141–60. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhandarkar, Milind A. "End-to-End Benchmark." In Encyclopedia of Big Data Technologies, 1–8. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63962-8_112-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gooch, Jan W. "End-to-End Distance." In Encyclopedic Dictionary of Polymers, 268. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_4410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weik, Martin H. "end-to-end encryption." In Computer Science and Communications Dictionary, 522. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6235.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "End-To-End"

1

Wiesmann, Matthias, and Xavier Defago. "End-to-end consensus using end-to-end channels." In 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06). IEEE, 2006. http://dx.doi.org/10.1109/prdc.2006.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Jian, and Andrew Moore. "Traffic Trace Artifacts due to Monitoring Via Port Mirroring." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services (IEEE Cat. No. 05EX1107)." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Copyright page." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Workshop co-chairs." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Reviewers." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ito, Yoshihiro, and Shuji Tasaka. "End-to-End Monitoring of Multidimensional User-Level QoS in Audio-Video IP Transmission." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Augustin, Brice, Timur Friedman, and Renata Teixeira. "Multipath tracing with Paris traceroute." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tsugawa, Tomoaki, Cao Le Thanh Man, Go Hasegawa, and Masayuki Murata. "Inline bandwidth measurements: Implementation difficulties and their solutions." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Guang, Jian Gong, and Yongning Tang. "A Hybrid Sampling Approach for Network Flow Monitoring." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375315.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "End-To-End"

1

Marshak, Ronni. End-to-End Customer Experience. Boston, MA: Patricia Seybold Group, February 2011. http://dx.doi.org/10.1571/psgp02-10-11cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Best, Jeremy. End to End Weapons Engineering. Office of Scientific and Technical Information (OSTI), November 2020. http://dx.doi.org/10.2172/1711352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malis, A. G. PSN End-to-End functional specification. RFC Editor, March 1986. http://dx.doi.org/10.17487/rfc0979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mathews, A., T. Kwan, K. Buescher, C. Snell, and K. Adams. End-to-End Radiographic Systems Simulation. Office of Scientific and Technical Information (OSTI), July 1999. http://dx.doi.org/10.2172/759186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Montenegro, G., and M. Borella. RSIP Support for End-to-end IPsec. RFC Editor, October 2001. http://dx.doi.org/10.17487/rfc3104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Jonah. End-to-End Modeling of a Kilonova. Office of Scientific and Technical Information (OSTI), August 2021. http://dx.doi.org/10.2172/1818091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dawkins, S., G. Montenegro, M. Kojo, and V. Magret. End-to-end Performance Implications of Slow Links. RFC Editor, July 2001. http://dx.doi.org/10.17487/rfc3150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malas, D., and A. Morton. Basic Telephony SIP End-to-End Performance Metrics. RFC Editor, January 2011. http://dx.doi.org/10.17487/rfc6076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aldrich, Susan. End-to-End Search Marketing and Customer Experience. Boston, MA: Patricia Seybold Group, June 2008. http://dx.doi.org/10.1571/ta06-26-08cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hovey, Paul, and Gary Marchand. End-to-End Test interim Report Phase 3. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada381057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography