Journal articles on the topic 'Extended access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Extended access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dielmann, Fabian, Marek Sierka, Alexander V Virovets, and Manfred Scheer. "Access to Extended Polyphosphorus Frameworks." Angewandte Chemie International Edition 49, no. 38 (2010): 6860–64. http://dx.doi.org/10.1002/anie.201001000.
Full textHancock, Dave. "Time for extended GP access?" Practice Management 28, no. 7 (2018): 22–26. http://dx.doi.org/10.12968/prma.2018.28.7.22.
Full textTurchet, Luca, Rob Hamilton, and Anil Camci. "Music in Extended Realities." IEEE Access 9 (2021): 15810–32. http://dx.doi.org/10.1109/access.2021.3052931.
Full textHenke, Michael J. "Open-access transportation extended to ocs." Natural Gas 9, no. 7 (2008): 13–15. http://dx.doi.org/10.1002/gas.3410090705.
Full textMcCutcheon, Jonathan. "Primary care networks: Extended hours access." Practice Management 29, no. 6 (2019): 40–42. http://dx.doi.org/10.12968/prma.2019.29.6.40.
Full textFurst, K., T. Schmidt, and G. Wippel. "Managing access in extended enterprise networks." IEEE Internet Computing 6, no. 5 (2002): 67–74. http://dx.doi.org/10.1109/mic.2002.1036040.
Full textAboutabl, Mohamed, Ashok Agrawala, and Jean-Dominique Decotignie. "Temporally determinate disk access (extended abstract)." ACM SIGMETRICS Performance Evaluation Review 26, no. 1 (1998): 280–81. http://dx.doi.org/10.1145/277858.277950.
Full textMa, Tianli, Qi Zhang, Chaobo Chen, and Song Gao. "Tracking of Maneuvering Star-Convex Extended Target Using Modified Adaptive Extended Kalman Filter." IEEE Access 8 (2020): 214030–38. http://dx.doi.org/10.1109/access.2020.3029804.
Full textLopriore, Lanfranco. "Access right management by extended password capabilities." International Journal of Information Security 17, no. 5 (2017): 603–12. http://dx.doi.org/10.1007/s10207-017-0390-0.
Full textJia, Jun-Mei, Zai-Zai Yan, and Xiu-Yun Peng. "A New Discrete Extended Weibull Distribution." IEEE Access 7 (2019): 175474–86. http://dx.doi.org/10.1109/access.2019.2957788.
Full textWen, Nuan, and Fang Zhang. "Extended Factorization Machines for Sequential Recommendation." IEEE Access 8 (2020): 41342–50. http://dx.doi.org/10.1109/access.2020.2977231.
Full textKumar, Kundan, Shovan Bhaumik, and Paresh Date. "Extended Kalman Filter Using Orthogonal Polynomials." IEEE Access 9 (2021): 59675–91. http://dx.doi.org/10.1109/access.2021.3073289.
Full textWang, Kai, Haruka Matsukura, Daisuke Iwai, and Kosuke Sato. "Stabilizing Graphically Extended Hand for Hand Tremors." IEEE Access 6 (2018): 28838–47. http://dx.doi.org/10.1109/access.2018.2840101.
Full textBobrovs, Vjaceslavs, S. Spolitis, is, and Girts Ivanovs. "Extended reach spectrum-sliced passive optical access network." International Journal of Physical Sciences 8, no. 13 (2013): 537–48. http://dx.doi.org/10.5897/ijps2013.3868.
Full textIwata, Takashi, Takashi Yasuoka, Shoji Hanada, et al. "Extended Thymectomy via Videothoracoscopy-assisted Stepwise-access Sternotomy." Annals of Thoracic and Cardiovascular Surgery 17, no. 4 (2011): 337–40. http://dx.doi.org/10.5761/atcs.oa.10.01568.
Full textGutowski, K. A. "The Minimal Access Deep Plane Extended Vertical Facelift." Yearbook of Plastic and Aesthetic Surgery 2013 (January 2013): 98–99. http://dx.doi.org/10.1016/j.yprs.2012.01.003.
Full textBoebert, W. E., and R. Y. Kain. "The extended access matrix model of computer security." ACM SIGSOFT Software Engineering Notes 10, no. 4 (1985): 119–25. http://dx.doi.org/10.1145/1012497.1012548.
Full textBanerjee, Anindya, and David A. Naumann. "Representation independence, confinement and access control [extended abstract]." ACM SIGPLAN Notices 37, no. 1 (2002): 166–77. http://dx.doi.org/10.1145/565816.503289.
Full textLepley, Jason J., Manoj P. Thakur, Ioannis Tsalamanis, et al. "VDSL transmission over a fiber extended-access network." Journal of Optical Networking 4, no. 8 (2005): 517. http://dx.doi.org/10.1364/jon.4.000517.
Full textJacono, Andrew A., and Sachin S. Parikh. "The Minimal Access Deep Plane Extended Vertical Facelift." Aesthetic Surgery Journal 31, no. 8 (2011): 874–90. http://dx.doi.org/10.1177/1090820x11424146.
Full textAlbertini, Davide Alberto, Barbara Carminati, and Elena Ferrari. "An extended access control mechanism exploiting data dependencies." International Journal of Information Security 16, no. 1 (2016): 75–89. http://dx.doi.org/10.1007/s10207-016-0322-4.
Full textZhang, Huanhuan, Yinghui Wang, xiaojuan Ning, Ke Lv, and Ningna Wang. "Volume Data Denoising via Extended Weighted Least Squares." IEEE Access 7 (2019): 2750–58. http://dx.doi.org/10.1109/access.2018.2886224.
Full textHuang, Xingguo. "Extended Beam Approximation for High-Frequency Wave Propagation." IEEE Access 6 (2018): 37214–24. http://dx.doi.org/10.1109/access.2018.2849595.
Full textCui, Jian, Shurong Bian, and Aidi Li. "A Multiobjective Optimization Approach for Extended Interaction Oscillators." IEEE Access 8 (2020): 166226–35. http://dx.doi.org/10.1109/access.2020.3022790.
Full textLiubogoshchev, Mikhail, Kamila Ragimova, Andrey Lyakhov, Siyu Tang, and Evgeny Khorov. "Adaptive Cloud-Based Extended Reality: Modeling and Optimization." IEEE Access 9 (2021): 35287–99. http://dx.doi.org/10.1109/access.2021.3062555.
Full textYang, Zhenzhen, Ziyou Gao, Huijun Sun, Feng Liu, and Jiandong Zhao. "Finding Most Reliable Path With Extended Shifted Lognormal Distribution." IEEE Access 6 (2018): 72494–505. http://dx.doi.org/10.1109/access.2018.2878312.
Full textXu, Guixian, Ziheng Yu, Haishen Yao, Fan Li, Yueting Meng, and Xu Wu. "Chinese Text Sentiment Analysis Based on Extended Sentiment Dictionary." IEEE Access 7 (2019): 43749–62. http://dx.doi.org/10.1109/access.2019.2907772.
Full textRen, Yi, Dongming Fan, Zili Wang, et al. "System Dynamic Behavior Modeling Based on Extended GO Methodology." IEEE Access 6 (2018): 22513–23. http://dx.doi.org/10.1109/access.2018.2816165.
Full textZhong, Deyun, Liguan Wang, and Lin Bi. "Extended Hermite Radial Basis Functions for Sparse Contours Interpolation." IEEE Access 8 (2020): 58752–62. http://dx.doi.org/10.1109/access.2020.2982802.
Full textLi, Xiaoman, Cui Wang, Xuefu Zhang, and Wei Sun. "Generic SAO Similarity Measure via Extended Sørensen-Dice Index." IEEE Access 8 (2020): 66538–52. http://dx.doi.org/10.1109/access.2020.2984024.
Full textFarooq, Umar, Jason Gu, Mohamed El-Hawary, Muhammad Usman Asad, and Jun Luo. "An Extended State Convergence Architecture for Multilateral Teleoperation Systems." IEEE Access 5 (2017): 2063–79. http://dx.doi.org/10.1109/access.2017.2658347.
Full textQiu, Ji, Lide Wang, Yin Wang, and Yu Hen Hu. "Multi-Event Modeling and Recognition Using Extended Petri Nets." IEEE Access 8 (2020): 37879–90. http://dx.doi.org/10.1109/access.2020.2975095.
Full textZhang, Zhiguo, Jinping Sun, Qing Li, Chao Liu, and Guanhua Ding. "A Novel MS-MeMBer Filter for Extended Targets Tracking." IEEE Access 8 (2020): 37596–607. http://dx.doi.org/10.1109/access.2020.2975648.
Full textWang, Chengyu, Limin Yu, Xu Zhu, Jionglong Su, and Fei Ma. "Extended ResNet and Label Feature Vector Based Chromosome Classification." IEEE Access 8 (2020): 201098–108. http://dx.doi.org/10.1109/access.2020.3034684.
Full textLuo, Min, Xiaorong Hou, and Jing Yang. "Surface Optimal Path Planning Using an Extended Dijkstra Algorithm." IEEE Access 8 (2020): 147827–38. http://dx.doi.org/10.1109/access.2020.3015976.
Full textZhang, Shuai, Yangbing Xu, and Wenyu Zhang. "Clustering Scientific Document Based on an Extended Citation Model." IEEE Access 7 (2019): 57037–46. http://dx.doi.org/10.1109/access.2019.2913995.
Full textLi, Yanping, and Wenming Cao. "An Extended Multilayer Perceptron Model Using Reduced Geometric Algebra." IEEE Access 7 (2019): 129815–23. http://dx.doi.org/10.1109/access.2019.2940217.
Full textFu, Yitu, and Ju Xu. "Malware Detection via Extended Label Propagation Through Graph Inference." IEEE Access 7 (2019): 157830–40. http://dx.doi.org/10.1109/access.2019.2948374.
Full textHou, Zhaoyang, Zheng Xiang, Peng Ren, and Bohao Cao. "SCMA Codebook Design Based on Divided Extended Mother Codebook." IEEE Access 9 (2021): 71563–76. http://dx.doi.org/10.1109/access.2021.3078568.
Full textGong, Liang, Asa Fast-Berglund, and Bjorn Johansson. "A Framework for Extended Reality System Development in Manufacturing." IEEE Access 9 (2021): 24796–813. http://dx.doi.org/10.1109/access.2021.3056752.
Full textEl-Ghezawi, Omar M. "Ackermann’s Method: Revisited, Extended, and Generalized to Uncontrollabe Systems." IEEE Access 9 (2021): 129552–59. http://dx.doi.org/10.1109/access.2021.3111928.
Full textSUN, Ling, Yan XIN, and Chang-yuan LUO. "Pervasive computing access control model based on extended RBAC." Journal of Computer Applications 30, no. 4 (2010): 1045–47. http://dx.doi.org/10.3724/sp.j.1087.2010.01045.
Full textXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Full textStanley, Robert, and Paul Toffel. "The Extended Access Approach for Treatment of Maxillary Fractures." Facial Plastic Surgery 5, no. 03 (1988): 213–19. http://dx.doi.org/10.1055/s-2008-1064755.
Full textLee, Kai-Hui, and Pei-Ling Chiu. "An Extended Visual Cryptography Algorithm for General Access Structures." IEEE Transactions on Information Forensics and Security 7, no. 1 (2012): 219–29. http://dx.doi.org/10.1109/tifs.2011.2167611.
Full textBrown, Edwina A., and Caroline Judge. "Extended access to peritoneal dialysis for frail older patients." Journal of Renal Nursing 1, no. 3 (2009): 114–18. http://dx.doi.org/10.12968/jorn.2009.1.3.44437.
Full textKim, J. S., D. Munir, S. F. Hasan, and M. Y. Chung. "Enhancement of LTE RACH through extended random access process." Electronics Letters 50, no. 19 (2014): 1399–400. http://dx.doi.org/10.1049/el.2014.1159.
Full textVerkhodanov, O. V., Ya V. Naiden, V. N. Chernenkov, and N. V. Verkhodanova. "Database of extended radiation maps and its access system." Astrophysical Bulletin 69, no. 1 (2014): 113–20. http://dx.doi.org/10.1134/s1990341314010106.
Full textKobayashi, Shinji, Kazunori Yasumura, Yuichiro Yabuki, Toshihiko Satake, Jiro Maegawa, and Yukichi Tanaka. "Extended Maxillotomy for Nasopharynx Access in Infantile Immature Teratoma." Journal of Craniofacial Surgery 31, no. 1 (2020): 77–78. http://dx.doi.org/10.1097/scs.0000000000005875.
Full textStelter, A. "Efficient access to extended channel bandwidth in wireless LAN." Electronics Letters 49, no. 21 (2013): 1356–58. http://dx.doi.org/10.1049/el.2013.2707.
Full text