Academic literature on the topic 'User access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "User access"
van den Hoven, John. "End–User Access Tools." Information Systems Management 13, no. 2 (January 1996): 76–78. http://dx.doi.org/10.1080/10580539608906991.
Full textWang, Guowei, Dongliang Liao, and Jing Li. "Complete User Mobility via User and Trajectory Embeddings." IEEE Access 6 (2018): 72125–36. http://dx.doi.org/10.1109/access.2018.2881457.
Full textPotter, Liz, and Mark Bide. "User authentication and access management." Publishing Research Quarterly 15, no. 2 (June 1999): 24–29. http://dx.doi.org/10.1007/s12109-999-0026-y.
Full textGaudin, Germain, and Alexander White. "Vertical Agreements and User Access." American Economic Journal: Microeconomics 13, no. 3 (August 1, 2021): 328–71. http://dx.doi.org/10.1257/mic.20180339.
Full textBrowning, Sommer, and Charissa Brammer. "User categories: ensuring library access for all institutional users." Journal of Electronic Resources Librarianship 33, no. 2 (April 3, 2021): 120–26. http://dx.doi.org/10.1080/1941126x.2021.1912544.
Full textPervez, Farrukh, Mona Jaber, Junaid Qadir, Shahzad Younis, and Muhammad Ali Imran. "Memory-Based User-Centric Backhaul-Aware User Cell Association Scheme." IEEE Access 6 (2018): 39595–605. http://dx.doi.org/10.1109/access.2018.2850752.
Full textWang, Yue, Xiaofeng Tao, Xuefei Zhang, and Guoqiang Mao. "Joint Caching Placement and User Association for Minimizing User Download Delay." IEEE Access 4 (2016): 8625–33. http://dx.doi.org/10.1109/access.2016.2633488.
Full textKassa, Yonas Mitike, Ruben Cuevas, and Angel Cuevas. "A Large-Scale Analysis of Facebook’s User-Base and User Engagement Growth." IEEE Access 6 (2018): 78881–91. http://dx.doi.org/10.1109/access.2018.2885458.
Full textDeng, Kaikai, Ling Xing, Longshui Zheng, Honghai Wu, Ping Xie, and Feifei Gao. "A User Identification Algorithm Based on User Behavior Analysis in Social Networks." IEEE Access 7 (2019): 47114–23. http://dx.doi.org/10.1109/access.2019.2909089.
Full textTong, Shiyuan, Yun Liu, Mohamed Cheriet, Michel Kadoch, and Bo Shen. "UCAA: User-Centric User Association and Resource Allocation in Fog Computing Networks." IEEE Access 8 (2020): 10671–85. http://dx.doi.org/10.1109/access.2020.2965218.
Full textDissertations / Theses on the topic "User access"
Tukkensæter, Brage Rønning. "User Friendly Access Solutions for Mobile WiMAX." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9909.
Full textToday, WiMAX networks are deployed several places worldwide. To get access to these networks, users have to buy equipment specialized for one operator with a subscription. User equipment has earlier been stationary or mounted, but with the Mobile WiMAX amendment, smaller receivers are made possible. Mobile WiMAX allows users to move between different operators, making user access and roaming a more challenging task. In this thesis, several Mobile WiMAX access solutions are discussed, emphasizing security and user friendliness. A captive portal solution is developed, and an EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) solution utilizing FreeRADIUS is planned. Security in WiMAX is compared to Wi-Fi very good. Even in an open WiMAX network traffic can be encrypted, this makes a WiMAX captive portal solution secure for most purposes. For traveling or visiting users, the EAP-TTLS solution may be complicated to use. Users need an account prior to the connection, or the visited operator needs roaming agreements with the users home operator. Roaming agreements are not common today, but is currently promoted by the WiMAX Forum. With the captive portal, users are able to buy access without having an account or subscription in advance. A captive portal solution is recommended for visiting users, and EAP-TTLS without roaming is recommended for users more permanently located in the operators area. EAP-based roaming may be deployed if roaming becomes more common in the future, but is not recommended today. In this thesis, several Mobile WiMAX access solutions are discussed, emphasizing security and user friendliness. A captive portal solution is developed, and an EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) solution utilizing FreeRADIUS is planned. Security in WiMAX is compared to Wi-Fi very good. Even in an open WiMAX network traffic can be encrypted, this makes a WiMAX captive portal solution secure for most purposes. For traveling or visiting users, the EAP-TTLS solution may be complicated to use. Users need an account prior to the connection, or the visited operator needs roaming agreements with the users home operator. Roaming agreements are not common today, but is currently promoted by the WiMAX Forum. With the captive portal, users are able to buy access without having an account or subscription in advance. A captive portal solution is recommended for visiting users, and EAP-TTLS without roaming is recommended for users more permanently located in the operators area. EAP-based roaming may be deployed if roaming becomes more common in the future, but is not recommended today.
Serif, Tacha. "The mobile information access experience : a user perspective." Thesis, Brunel University, 2006. http://bura.brunel.ac.uk/handle/2438/7137.
Full textChang, Tae-Young. "User-activity aware strategies for mobile information access." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22595.
Full textCommittee Chair: Raghupathy Sivakumar; Committee Member: Chuanyi Ji; Committee Member: George Riley; Committee Member: Magnus Egerstedt; Committee Member: Umakishore Ramachandran.
Li, Chunsheng. "Spatial data : access and usability across the Internet." Thesis, Manchester Metropolitan University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247486.
Full textMakin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Full textMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Nilsson, Olof. "Access Barriers - from a user´s point of view." Doctoral thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-5799.
Full textPI - Publika Informationssystem
Klas, Claus-Peter Goevert Norbert Fuhr Norbert. "Distributed agents for user-friendly access of Digital Libraries." Gerhard-Mercator-Universitaet Duisburg, 2004. http://www.ub.uni-duisburg.de/ETD-db/theses/available/duett-04232004-151931/.
Full textHead, Milena M. "User interface features, facilitating information access and decision making." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0007/NQ42743.pdf.
Full textHead, Milena M. "User interface features : facilitating information access and decision making /." *McMaster only, 1997.
Find full textWang, Hui. "Mining novel Web user behavior models for access prediction /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WANG.
Full textIncludes bibliographical references (leaves 83-91). Also available in electronic version. Access restricted to campus users.
Books on the topic "User access"
Jasper, Kim. User access & information protection: Managing open access & information protection. Hamburg [Germany]: PROJECT CONSULT, 2002.
Find full textGleason, Bernard W. Open access: A user information system. Boulder, Colo. (4840 Pearl East Circle, Suite 302E, Boulder 80301): CAUSE, the Association for the Management of Information Technology in Higher Education, 1991.
Find full textKavanagh, Chapman Kathleen, and Leben Joe, eds. Systems application architecture: Common user access. Englewood Cliffs, N.J: Prentice-Hall, 1991.
Find full textDavid, Mercer. Microsoft Access 97: Microsoft Office user specialist. Scottsdale, Ariz: Certification Insider Press, 1999.
Find full textCorporation, Quarterdeck. Procomm RapidRemote: User guide. Marina del Rey, CA: Quarterdeck, 1996.
Find full textHunter, J. NASA access mechanism: Graphical user interface information retrieval system. [Washington, DC]: National Aeronautics and Space Administration, 1993.
Find full textErcegovac, Zorana. Information access instruction. Los Angeles: InfoEN Associates, 1995.
Find full textPerth & Kinross Council. Housing & Community Care. Making access easier for you: Service user issues & suggested actions. Perth: Perth & Kinross Council, 2004.
Find full textHelme, Arne. A system for secure user-controlled electronic transactions. Maastricht: Shaker Publishing, 1997.
Find full text1954-, Slack Frances, ed. Designing public access systems. Aldershot: Gower, 1998.
Find full textBook chapters on the topic "User access"
Kahlout, Gabriele. "User access." In Spinning Up ServiceNow, 41–56. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2571-4_3.
Full textSiriwardena, Prabath. "User-Managed Access." In Advanced API Security, 277–86. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-2050-4_13.
Full textSchwartz, Michael, and Maciej Machulak. "User-Managed Access." In Securing the Perimeter, 267–99. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-2601-8_8.
Full textPetritsch, Helmut. "User Information: At-Access." In Break-Glass, 93–105. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-07365-7_5.
Full textSiriwardena, Prabath. "User Managed Access (UMA)." In Advanced API Security, 155–70. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8_10.
Full textCollins, Mark. "Enhancing the User Experience." In Pro Access 2010 Development, 255–89. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3579-8_10.
Full textPazzani, Michael. "Adaptive Interfaces for Ubiquitous Web Access." In User Modeling 2003, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44963-9_1.
Full textGori, Marco, Marco Maggini, and Enrico Martinelli. "Web-Browser Access Through Voice Input and Page Interest Prediction." In User Modeling, 17–19. Vienna: Springer Vienna, 1997. http://dx.doi.org/10.1007/978-3-7091-2670-7_2.
Full textStockhause, Martina. "User Driven Data Access Mechanisms." In Earth System Modelling - Volume 6, 33–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37244-5_5.
Full textSieberichs, Dagmar, and Hans-Joachim Krüger. "Die ‘Access User Group’ entsteht." In Vieweg Software-Trainer Microsoft Access für Windows, 163–210. Wiesbaden: Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-89437-3_8.
Full textConference papers on the topic "User access"
Kalman, Gyorgy, and Josef Noll. "User controlled content access." In 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.
Full textHammann, Sven, Saša Radomirović, Ralf Sasse, and David Basin. "User Account Access Graphs." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3354193.
Full textNeat, Leo, Ren Peng, Siyang Qin, and Roberto Manduchi. "Scene text access." In IUI '19: 24th International Conference on Intelligent User Interfaces. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3301275.3302271.
Full textShah, M. A., M. Kornacker, and J. M. Hellerstein. "Amdb: a visual access method development tool." In Proceedings User Interfaces to Data Intensive Systems. IEEE, 1999. http://dx.doi.org/10.1109/uidis.1999.791469.
Full textFröhlich, B., J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. L. Yuan, and A. J. Shields. "A Multi-User Quantum Access Network." In CLEO: QELS_Fundamental Science. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/cleo_qels.2013.qtu2c.6.
Full textSerafimovski, Nikola, Sinan Sinanovic, Abdelhamid Younis, Marco Di Renzo, and Harald Haas. "2-User multiple access spatial modulation." In 2011 IEEE Globecom Workshops. IEEE, 2011. http://dx.doi.org/10.1109/glocomw.2011.6162467.
Full textSeraghiti, Andrea, and Alessandro Bogliolo. "User-Provided Wireless Neutral Access Networks." In 2010 Second International Conference on Advances in Future Internet (AFIN). IEEE, 2010. http://dx.doi.org/10.1109/afin.2010.12.
Full textSu, Linying. "User Behaviour Based Access Control Decision." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.349.
Full textMachulak, Maciej P., Eve L. Maler, Domenico Catalano, and Aad van Moorsel. "User-managed access to web resources." In the 6th ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866855.1866865.
Full textSaidi, Samia, Yahya Slimani, and Khedija Arour. "Webview selection from user access patterns." In the ACM first Ph.D. workshop in CIKM. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1316874.1316901.
Full textReports on the topic "User access"
RamaRao, Saumya, Wilson Liambila, Fatou Mbow, and Avishek Hazra. Infographic—Getting to market: Roadmap for user access. Population Council, 2020. http://dx.doi.org/10.31899/rh13.1020.
Full textKazakos, D., and I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, February 1987. http://dx.doi.org/10.21236/ada186041.
Full textSciberras, A., ed. Lightweight Directory Access Protocol (LDAP): Schema for User Applications. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4519.
Full textLong, A. C., Courtney Moskowitz, and Greg Ganger. A Prototype User Interface for Coarse-Grained Desktop Access Control. Fort Belvoir, VA: Defense Technical Information Center, November 2003. http://dx.doi.org/10.21236/ada488514.
Full textSellers, C., B. Fox, and J. Paulz. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability. Office of Scientific and Technical Information (OSTI), March 1996. http://dx.doi.org/10.2172/204135.
Full textSmith, S. K., J. C. Prather, E. K. Ligotke, and C. R. Watson. National Radiobiology Archives Distributed Access User`s Manual, Version 1.1. Revision 1. Office of Scientific and Technical Information (OSTI), June 1992. http://dx.doi.org/10.2172/10183970.
Full textNelson, D., and G. Weber. Remote Authentication Dial-In User Service (RADIUS) Authorization for Network Access Server (NAS) Management. RFC Editor, July 2009. http://dx.doi.org/10.17487/rfc5607.
Full textStavrakakis, I., and D. Kazakos. On the Approximation of the Output Process of Multi-User Random Access Communication Networks. Fort Belvoir, VA: Defense Technical Information Center, June 1987. http://dx.doi.org/10.21236/ada186197.
Full textMackley, Rob D., George V. Last, and Craig H. Allwardt. Hanford Borehole Geologic Information System (HBGIS) Updated User?s Guide for Web-based Data Access and Export. Office of Scientific and Technical Information (OSTI), September 2008. http://dx.doi.org/10.2172/969742.
Full textChaudhary, Aashish. Climatepipes: User-friendly data access, data manipulation, data analysis and visualization of community climate models Phase II. Office of Scientific and Technical Information (OSTI), September 2015. http://dx.doi.org/10.2172/1213562.
Full text