Academic literature on the topic 'Information Access Pattern'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information Access Pattern.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information Access Pattern"
Shanta.S.Betageri and Chandrappa S. "Electronic Resources Use and Access Pattern." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2019): 99–104. https://doi.org/10.5281/zenodo.3335446.
Full textBarik, Nilaranjan, and Puspanjali Jena. "Author productivity pattern and applicability of Lotka’s inverse square law: a bibliometric appraisal of selected LIS open access journals." Digital Library Perspectives 37, no. 3 (2021): 223–41. http://dx.doi.org/10.1108/dlp-10-2020-0103.
Full textUnger, A. Y. "A formal pattern of information system design." Journal of Physics: Conference Series 2094, no. 3 (2021): 032045. http://dx.doi.org/10.1088/1742-6596/2094/3/032045.
Full textYan, Jing, Zhao Chang, Ke Cheng, and Shuguang Wang. "A Range Query Method for Data Access Pattern Protection Based on Uniform Access Frequency Distribution." Journal of Networking and Network Applications 3, no. 1 (2023): 11–18. http://dx.doi.org/10.33969/j-nana.2023.030102.
Full textYun, Unil, Gwangbum Pyun, and Eunchul Yoon. "Efficient Mining of Robust Closed Weighted Sequential Patterns Without Information Loss." International Journal on Artificial Intelligence Tools 24, no. 01 (2015): 1550007. http://dx.doi.org/10.1142/s0218213015500074.
Full textMorishita-Suzuki, Kumi, and Shuichiro Watanabe. "Health Information Source Patterns and Dietary Variety among Older Adults Living in Rural Japan." International Journal of Environmental Research and Public Health 21, no. 7 (2024): 865. http://dx.doi.org/10.3390/ijerph21070865.
Full textChu, Maoxiang, Liming Liu, Yonghui Yang, and Rongfen Gong. "Twin Support Vector Machine With Local Structural Information for Pattern Classification." IEEE Access 6 (2018): 64237–49. http://dx.doi.org/10.1109/access.2018.2877444.
Full textSMYTH, BARRY. "ADAPTIVE INFORMATION ACCESS: PERSONALIZATION AND PRIVACY." International Journal of Pattern Recognition and Artificial Intelligence 21, no. 02 (2007): 183–205. http://dx.doi.org/10.1142/s0218001407005363.
Full textBANERJEE, ANINDYA, and DAVID A. NAUMANN. "Stack-based access control and secure information flow." Journal of Functional Programming 15, no. 2 (2005): 131–77. http://dx.doi.org/10.1017/s0956796804005453.
Full textBerridge, Philip, Volker Koch, and Andre G. P. Brown. "Information Spaces for Mobile City Access." International Journal of Architectural Computing 1, no. 1 (2003): 34–45. http://dx.doi.org/10.1260/147807703322467315.
Full textDissertations / Theses on the topic "Information Access Pattern"
Samii, Soheil. "Power Modeling and Scheduling of Tests for Core-based System Chips." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2863.
Full textOskarsson, Tim. "Digital incursion: Breaching the android lock screen and liberating data." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.
Full textYan, Peng Fan. "Detecting suspicious access patterns in secure physical environment." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2099647.
Full textKavathe, Rucha S. "Patterns of Access and Use of Online Health Information among Internet Users: A Case Study." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1250696451.
Full textMilne, Patricia A., and n/a. "The effect of enhanced electronic access to information on academics' patterns of scholarly communication at the Australian National University." University of Canberra. Information Management & Tourism, 1998. http://erl.canberra.edu.au./public/adt-AUC20050819.124920.
Full textYlikoski, Teemu. "Acces denied : patterns of consumer Internet information search and the effects of Internet search expertise /." Helsinki : Helsinki School of Economics, 2003. http://aleph.unisg.ch/hsgscan/hm00085002.pdf.
Full textCousins, Karlene C. "Access Anytime Anyplace: An Empircal Investigation of Patterns of Technology Use in Nomadic Computing Environments." unrestricted, 2004. http://etd.gsu.edu/theses/available/etd-12132004-144636/.
Full textTorres, Carvajal Raul Ernesto [Verfasser], and Thomas [Akademischer Betreuer] Ludwig. "Comparison of Compiler's Intermediate Representations and Input/Output Access Patterns with String Kernels / Raul Ernesto Torres Carvajal ; Betreuer: Thomas Ludwig." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2018. http://d-nb.info/1173323074/34.
Full textTorres, Carvajal Raul Ernesto Verfasser], and Thomas [Akademischer Betreuer] [Ludwig. "Comparison of Compiler's Intermediate Representations and Input/Output Access Patterns with String Kernels / Raul Ernesto Torres Carvajal ; Betreuer: Thomas Ludwig." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2018. http://d-nb.info/1173323074/34.
Full textBadino, Leonardo. "Identifying prosodic prominence patterns for English text-to-speech synthesis." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4744.
Full textBooks on the topic "Information Access Pattern"
Arthur, S. W. Enhanced logical access control of distributed information systems using pattern recognition techniques. The Author], 1997.
Find full textIEEE Workshop on Content-Based Access of Image and Video Libraries (1998 Santa Barbara, Calif.). IEEE Workshop on Content-based Access of Image and Video Libraries: Proceedings : June 21, 1998, Santa Barabra, California. IEEE Computer Society, 1998.
Find full textIEEE Workshop on Content-Based Access of Image and Video Libraries (1997 San Juan, P.R.). Proceedings, IEEE Workshop on Content-Based Access of Image and Video Libraries: June 20, 1997, San Juan, Puerto Rico. IEEE Computer Society, 1997.
Find full textIEEE Workshop on Content-Based Access of Image and Video Libraries (2001 Kauai, Hawaii). IEEE Workshop on Content-Based Access of Image and Video Libraries (CBAIVL 2001): Proceedings : 14 December, 2001, Kauai, Hawaii. IEEE Computer Society, 2001.
Find full textIEEE Workshop on Content-Based Access of Image and Video Libraries (2000 Hilton Head Island, S.C.). Proceedings, IEEE Workshop on Content-Based Access of Image and Video Libraries, Hilton Head Island, South Carolina, June 12, 2000. IEEE Computer Society, 2000.
Find full textDavid, Hutchison. Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings. Springer Berlin Heidelberg, 2009.
Find full textGregory, Neven, and SpringerLink (Online service), eds. Progress in Cryptology – LATINCRYPT 2012: 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textYlikoski, Teemu. Access denied: Patterns of consumer Internet information search and the effects of Internet search expertise. Helsinki School of Economics, 2003.
Find full textContent-Based Access of Image and Video Libraries (Cbaivl 2001), 2001 IEEE Workshop on. Ieee, 2001.
Find full textBook chapters on the topic "Information Access Pattern"
Morzy, Tadeusz, Marek Wojciechowski, and Maciej Zakrzewicz. "Optimizing Pattern Queries for Web Access Logs." In Advances in Databases and Information Systems. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44803-9_12.
Full textAlraizza, Amjad, Abdulmohsen Algarni, and Asmaa Alrayzah. "Enhancing Ransomware Detection Using Storage Access Pattern." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-96231-8_5.
Full textKitsuregawa, Masaru, and Iko Pramudiono. "PC Cluster Based Parallel Frequent Pattern Mining and Parallel Web Access Pattern Mining." In Databases in Networked Information Systems. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39845-5_14.
Full textShin, Ilhoon. "Influence of Access Pattern on Performance of NAND-Based Storage." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22603-8_6.
Full textBao, Jian. "Research of Matrix Clustering Algorithm Based on Web User Access Pattern." In Web Information Systems and Mining. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23982-3_20.
Full textCho, Doosan. "A Memory Access Pattern Based Data Distribution Technique for Array Processors." In Convergence and Hybrid Information Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_80.
Full textVan Rompay, Cédric, Refik Molva, and Melek Önen. "Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01950-1_23.
Full textSaiz-Noeda, Maximiliano, José Luis Vicedo, and Rubén Izquierdo. "Pattern-Based Image Retrieval with Constraints and Preferences on ImageCLEF 2004." In Multilingual Information Access for Text, Speech and Images. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11519645_61.
Full textTang, Xingpeng, and Jingwei Li. "Improving Online Restore Performance of Backup Storage via Historical File Access Pattern." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8445-7_23.
Full textMangal, Deepak, Saurabh Singhal, and Dilip Sharma. "An Algorithm for Prediction of Web User Navigation Pattern and Restructuring of Web Structure Based on Visitor’s Web Access Pattern." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9942-8_64.
Full textConference papers on the topic "Information Access Pattern"
Yan, Jianxiang, Guanghui Song, Ying Li, Zhaoji Zhang, and Yuhao Chi. "Enhanced ODMA with Channel Code Design and Pattern Collision Resolution for Unsourced Multiple Access." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619608.
Full textChen, Xu, Jiawei Zhang, Huitao Zhou, Bojun Zhang, Zhiqun Gu, and Yuefeng Ji. "A Traffic Pattern Identification and Switching Granularity Selection Scheme in Metro/Access All-Optical Switching Networks." In 2024 Asia Communications and Photonics Conference (ACP) and International Conference on Information Photonics and Optical Communications (IPOC). IEEE, 2024. https://doi.org/10.1109/acp/ipoc63121.2024.10809667.
Full text"IMPLEMENTING THE DATA ACCESS OBJECT PATTERN USING ASPECTJ." In 10th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001714805230530.
Full textCho, KyoungWoon, YeonSeung Ryu, Youjip Won, and Kern Koh. "Considering User's Access Pattern in Multimedia File Systems." In ITCom 2002: The Convergence of Information Technologies and Communications, edited by Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., and Ajay Divakaran. SPIE, 2002. http://dx.doi.org/10.1117/12.455698.
Full textReimer, Tim, Phil Abraham, and Qing Tan. "Federated Identity Access Broker Pattern for Cloud Computing." In 2013 16th International Conference on Network-Based Information Systems (NBiS). IEEE, 2013. http://dx.doi.org/10.1109/nbis.2013.23.
Full textKim, Changjong, Yongseok Son, and Sunggon Kim. "Towards Access Pattern Prediction for Big Data Applications." In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2022. http://dx.doi.org/10.1109/ictc55196.2022.9952775.
Full textNakano, Yuto, Shinsaku Kiyomoto, and Yutaka Miyake. "Evaluation of Memory Access Pattern Protection in a Practical Setting." In Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.01.
Full textHue, T. B. P., D. N. Thuc, T. B. D. Thuy, I. Echizen, and S. Wohlgemuth. "Protecting Access Pattern Privacy in Database Outsourcing Service." In 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA). IEEE, 2013. http://dx.doi.org/10.1109/waina.2013.198.
Full textGrund, Martin, Matthieu Schapranow, Jens Krueger, Jan Schaffner, and Anja Bog. "Shared Table Access Pattern Analysis for Multi-Tenant Applications." In 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises, AMIGE. IEEE, 2008. http://dx.doi.org/10.1109/amige.2008.ecp.37.
Full textLi, Xing, Qiquan Shi, Gang Hu, et al. "Block Access Pattern Discovery via Compressed Full Tensor Transformer." In CIKM '21: The 30th ACM International Conference on Information and Knowledge Management. ACM, 2021. http://dx.doi.org/10.1145/3459637.3482323.
Full textReports on the topic "Information Access Pattern"
Guzmán, Eduardo Alonso. Central American Report No. 1 (2000). Inter-American Development Bank, 2001. http://dx.doi.org/10.18235/0008590.
Full textJansson, Tor. Financing Microfinance: Exploring the Funding Side of Microfinance Institutions. Inter-American Development Bank, 2003. http://dx.doi.org/10.18235/0009076.
Full textLamarque, Hugh, and Hannah Brown. Key considerations: Mpox in the Busia-Malaba border region linking Uganda and Kenya. Institute of Development Studies, 2025. https://doi.org/10.19088/sshap.2025.022.
Full textCollins, Clarence O., and Tyler J. Hesser. altWIZ : A System for Satellite Radar Altimeter Evaluation of Modeled Wave Heights. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/39699.
Full textVlaicu, Razvan. Digital Payments Adoption by Consumers and Firms: Implications for Financial Inclusion. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013575.
Full textTawfik, Aly, and Utsav Shah. Analysis of Freight Movements in the San Joaquin Valley. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2131.
Full textMelad, Kris Ann. From Complaints to Opportunities: Analyzing Grievance Trends and Responsiveness in the 4Ps. Philippine Institute for Development Studies, 2023. http://dx.doi.org/10.62986/dp2023.25.
Full textLines, Lisa M., Florence K. L. Tangka, Sonja Hoover, and Sujha Subramanian. People with Colorectal Cancer in SEER-Medicare: Part D Uptake, Costs, and Outcomes. RTI Press, 2020. http://dx.doi.org/10.3768/rtipress.2020.rr.0037.2005.
Full textThomas, Samuel, Elaine Baker, Kamal Aryal, et al. Towards Climate Resilient Agriculture in Nepal: Solutions for smallholder farmers. International Centre for Integrated Mountain Development (ICIMOD), 2024. https://doi.org/10.53055/icimod.1077.
Full textLynch, Clifford, and Diane Goldenberg-Hart. Beyond the Pandemic: The Future of the Research Enterprise in Academic Year 2021-22 and Beyond. Coalition for Networked Information, 2021. http://dx.doi.org/10.56561/mwrp9673.
Full text