Academic literature on the topic 'Extended access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Extended access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Extended access"
Dielmann, Fabian, Marek Sierka, Alexander V Virovets, and Manfred Scheer. "Access to Extended Polyphosphorus Frameworks." Angewandte Chemie International Edition 49, no. 38 (2010): 6860–64. http://dx.doi.org/10.1002/anie.201001000.
Full textHancock, Dave. "Time for extended GP access?" Practice Management 28, no. 7 (2018): 22–26. http://dx.doi.org/10.12968/prma.2018.28.7.22.
Full textTurchet, Luca, Rob Hamilton, and Anil Camci. "Music in Extended Realities." IEEE Access 9 (2021): 15810–32. http://dx.doi.org/10.1109/access.2021.3052931.
Full textHenke, Michael J. "Open-access transportation extended to ocs." Natural Gas 9, no. 7 (2008): 13–15. http://dx.doi.org/10.1002/gas.3410090705.
Full textMcCutcheon, Jonathan. "Primary care networks: Extended hours access." Practice Management 29, no. 6 (2019): 40–42. http://dx.doi.org/10.12968/prma.2019.29.6.40.
Full textFurst, K., T. Schmidt, and G. Wippel. "Managing access in extended enterprise networks." IEEE Internet Computing 6, no. 5 (2002): 67–74. http://dx.doi.org/10.1109/mic.2002.1036040.
Full textAboutabl, Mohamed, Ashok Agrawala, and Jean-Dominique Decotignie. "Temporally determinate disk access (extended abstract)." ACM SIGMETRICS Performance Evaluation Review 26, no. 1 (1998): 280–81. http://dx.doi.org/10.1145/277858.277950.
Full textMa, Tianli, Qi Zhang, Chaobo Chen, and Song Gao. "Tracking of Maneuvering Star-Convex Extended Target Using Modified Adaptive Extended Kalman Filter." IEEE Access 8 (2020): 214030–38. http://dx.doi.org/10.1109/access.2020.3029804.
Full textLopriore, Lanfranco. "Access right management by extended password capabilities." International Journal of Information Security 17, no. 5 (2017): 603–12. http://dx.doi.org/10.1007/s10207-017-0390-0.
Full textJia, Jun-Mei, Zai-Zai Yan, and Xiu-Yun Peng. "A New Discrete Extended Weibull Distribution." IEEE Access 7 (2019): 175474–86. http://dx.doi.org/10.1109/access.2019.2957788.
Full textDissertations / Theses on the topic "Extended access"
Khan, B. (Bilal). "Adaptive vehicular antenna system for extended range cellular access." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201606092485.
Full textMcDonough, Sharon. "Adolescents and the extended residential learning program : a case study." University of Ballarat, 2002. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14626.
Full textAbbas, June. "In the margins: Reflections on scribbles, knowledge organization, and access (extended abstract)." dLIST, 2007. http://hdl.handle.net/10150/105992.
Full textShi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.
Full textKarlsson, Oscar, and Erik Malmgren. "Has the Privatization of Uganda Commercial Bank Increased Competition and Extended Outreach of Formal Banking in Uganda?" Thesis, Uppsala University, Department of Economics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9247.
Full textKrügel, Rhelda. "The predictive power of two measures on academic success of first year B Ed English major students / Rhelda Krügel." Thesis, North-West University, 2011. http://hdl.handle.net/10394/10287.
Full textBachir, Abdelmalik. "Allongement de la durée de vie des réseaux sans fils de capteurs par l'optimisation des protocoles de routage et d'accès au canalOptimizing roting and channel access protocols to extend the lifetime of wireless sensor networks." Grenoble INPG, 2007. http://www.theses.fr/2007INPG0001.
Full textLEE, HUNG-EN, and 李宏恩. "Extended Visual Cryptograms of Random Grids for General Access Structure." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/w98bf9.
Full textChen, Dan-Wu, and 陳丹武. "Modeling and Analysis of Extended Access Barring Scheme for LTE Networks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/31441841673020819234.
Full textHuang, Chun-Hao, and 黃君豪. "EXACML: An Extended XACML Model to Ensure Secure Information Access in Web Services." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/38gju5.
Full textBooks on the topic "Extended access"
Pikover, Yuri. Security provisioning: Managing access in extended enterprises. Information Systems Audit and Control Foundation, 2002.
Find full textEnck, John. The essential guide to client access for DOS Extended. Duke Press, 1996.
Find full textKorboe, David. Extended poverty study (PPA phase 3): Access and utilisation of basic social services by the poor in Ghana : report commissioned by UNICEF under phase 3 of the Ghana participatory poverty assessment series. UNICEF, 1995.
Find full textBrazil. Shipping, equal access to government controlled cargoes: Agreement between the United States of America and Brazil amending and extending the agreement of November 17, 1977, as extended, effected by exchange of letters signed at Rio de Janeiro October 26, 1983. Dept. of State, 1992.
Find full textGOVERNMENT, US. Act to Amend the President John F. Kennedy Assassination Records Collection Act of 1992 to Extend the Authorization of the Assassination Records Review Board until September 30, 1998. U.S. G.P.O., 1997.
Find full textTo extend the District of Columbia College Access Act of 1999: Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 343, to extend the District of Columbia College Access Act of 1999. U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on Government Reform and Oversight. To amend the President John F. Kennedy Assassination Records Collection Act of 1992 to extend the authorization of the Assassination Records Review Board until September 30, 1998: Report (to accompany H.R. 1553) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1997.
Find full textUnited States. Congress. House. Committee on Government Reform and Oversight. To amend the President John F. Kennedy Assassination Records Collection Act of 1992 to extend the authorization of the Assassination Records Review Board until September 30, 1998: Report (to accompany H.R. 1553) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1997.
Find full textUnited States. Congress. House. Committee on Government Reform and Oversight. To amend the President John F. Kennedy Assassination Records Collection Act of 1992 to extend the authorization of the Assassination Records Review Board until September 30, 1998: Report (to accompany H.R. 1553) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1997.
Find full textBook chapters on the topic "Extended access"
Klevjer, Henning, Kent Are Varmedal, and Audun Jøsang. "Extended HTTP Digest Access Authentication." In Policies and Research in Identity Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37282-7_7.
Full textHuang, Dijiang, Qiuxiang Dong, and Yan Zhu. "Extended Identity-Revocable CP-ABE." In Attribute-Based Encryption and Access Control. CRC Press, 2020. http://dx.doi.org/10.1201/9781351210607-5.
Full textChaparadza, Ranganai, Razvan Petre, Arun Prakash, Felicián Németh, Sławomir Kukliński, and Alexej Starschenko. "IPv6 and Extended IPv6 (IPv6++) Features That Enable Autonomic Network Setup and Operation." In Access Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20931-4_16.
Full textBak, Jaroslaw, Grażyna Brzykcy, and Czeslaw Jedrzejek. "Extended Rules in Knowledge-Based Data Access." In Rule-Based Modeling and Computing on the Semantic Web. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24908-2_16.
Full textPoniszewska-Maranda, Aneta. "Access Control Management Using Extended RBAC Model." In Studies in Computational Intelligence. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27446-6_3.
Full textYu, Zheng. "An Extended Role-Based Access Control Model." In Recent Advances in Computer Science and Information Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25789-6_73.
Full textAl-Khalifa, Hend S., and Muna Al-Razgan. "ACCESS: A Free and Open Source Arabic Assistive Technology Repository." In HCI International 2014 - Posters’ Extended Abstracts. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07854-0_37.
Full textShin, Wook, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, and Jin-Seok Lee. "Extended Role Based Access Control and Procedural Restrictions." In Information Security and Cryptology - ICISC 2003. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24691-6_15.
Full textZorrilla, Eric P., Alison D. Kreisler, and Samantha R. Bagsic. "Intermittent Extended Access Rodent Models of Compulsive Eating." In Neuromethods. Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0924-8_8.
Full textZhang, Dong-Zhan, and Yong-Sheng Xue. "An Extended Mandatory Access Control Model for XML." In Advances in Computer Science – ASIAN 2005. Data Management on the Web. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596370_37.
Full textConference papers on the topic "Extended access"
Burmester, Michael, Joachim Machate, and Jochen Klein. "Access for all." In CHI '97 extended abstracts. ACM Press, 1997. http://dx.doi.org/10.1145/1120212.1120239.
Full textPerlman, Gary. "Universal web access." In CHI '99 extended abstracts. ACM Press, 1999. http://dx.doi.org/10.1145/632716.632930.
Full textScott, Neil G., and Isabelle Gingras. "The total access system." In CHI '01 extended abstracts. ACM Press, 2001. http://dx.doi.org/10.1145/634077.634078.
Full textScott, Neil G., and Isabelle Gingras. "The total access system." In CHI '01 extended abstracts. ACM Press, 2001. http://dx.doi.org/10.1145/634067.634078.
Full textVinter, S. T. "Extended discretionary access controls." In Proceedings. 1988 IEEE Symposium on Security and Privacy. IEEE, 1988. http://dx.doi.org/10.1109/secpri.1988.8096.
Full textRichter, Heather. "Understanding meeting capture and access." In CHI '02 extended abstracts. ACM Press, 2002. http://dx.doi.org/10.1145/506443.506480.
Full textJohnson, Jeff. "Universal access to the net." In CHI '97 extended abstracts. ACM Press, 1997. http://dx.doi.org/10.1145/1120212.1120290.
Full textMarsden, Gary, Robert Cherry, and Alan Haefele. "Small screen access to digital libraries." In CHI '02 extended abstracts. ACM Press, 2002. http://dx.doi.org/10.1145/506443.506597.
Full textBaca, Julie. "Displayless interface access to spatial data." In CHI '97 extended abstracts. ACM Press, 1997. http://dx.doi.org/10.1145/1120212.1120249.
Full textTan, Thomas. "Interactive linearisation in hypertext information access." In CHI '00 extended abstracts. ACM Press, 2000. http://dx.doi.org/10.1145/633292.633503.
Full textReports on the topic "Extended access"
Mitton, D. Network Access Servers Requirements: Extended RADIUS Practices. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2882.
Full textZanoni, Wladimir, and Ailin He. Citizenship and the Economic Assimilation of Canadian Immigrants. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003117.
Full textGikandi, Levi. COVID-19 and Vulnerable, Hardworking Kenyans: Why it's time for a strong social protection plan. Oxfam, Kenya Red Cross Society, Concern Worldwide, ACTED, IMPACT Initiatives, The Centre for Rights, Education and Awareness (CREAW), Wangu Kanja Foundation, 2020. http://dx.doi.org/10.21201/2020.6591.
Full textHabyarimana, James, Ken Ochieng' Opalo, and Youdi Schipper. The Cyclical Electoral Impacts of Programmatic Policies: Evidence from Education Reforms in Tanzania. Research on Improving Systems of Education (RISE), 2020. http://dx.doi.org/10.35489/bsg-rise-wp_2020/051.
Full textPlay and the pandemic: a rapid review of the literature and promising steps forward. ACAMH, 2020. http://dx.doi.org/10.13056/acamh.14323.
Full textFormal and informal abortion services in Rajasthan, India: Results of a situation analysis. Population Council, 2004. http://dx.doi.org/10.31899/rh17.1003.
Full text