Academic literature on the topic 'User access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "User access"

1

van den Hoven, John. "End–User Access Tools." Information Systems Management 13, no. 2 (January 1996): 76–78. http://dx.doi.org/10.1080/10580539608906991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Guowei, Dongliang Liao, and Jing Li. "Complete User Mobility via User and Trajectory Embeddings." IEEE Access 6 (2018): 72125–36. http://dx.doi.org/10.1109/access.2018.2881457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Potter, Liz, and Mark Bide. "User authentication and access management." Publishing Research Quarterly 15, no. 2 (June 1999): 24–29. http://dx.doi.org/10.1007/s12109-999-0026-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gaudin, Germain, and Alexander White. "Vertical Agreements and User Access." American Economic Journal: Microeconomics 13, no. 3 (August 1, 2021): 328–71. http://dx.doi.org/10.1257/mic.20180339.

Full text
Abstract:
Platforms acting as sales channels for producers often charge users for access via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per unit and proportional fees. In particular, we analyze the critical role that user access plays on prices, profits, and welfare under both forms of agreement. We characterize this role and show how it potentially overturns standard results saying that proportional fees lead to lower prices and higher profits. (JEL D21, D43, K21, L42, L86)
APA, Harvard, Vancouver, ISO, and other styles
5

Browning, Sommer, and Charissa Brammer. "User categories: ensuring library access for all institutional users." Journal of Electronic Resources Librarianship 33, no. 2 (April 3, 2021): 120–26. http://dx.doi.org/10.1080/1941126x.2021.1912544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pervez, Farrukh, Mona Jaber, Junaid Qadir, Shahzad Younis, and Muhammad Ali Imran. "Memory-Based User-Centric Backhaul-Aware User Cell Association Scheme." IEEE Access 6 (2018): 39595–605. http://dx.doi.org/10.1109/access.2018.2850752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Yue, Xiaofeng Tao, Xuefei Zhang, and Guoqiang Mao. "Joint Caching Placement and User Association for Minimizing User Download Delay." IEEE Access 4 (2016): 8625–33. http://dx.doi.org/10.1109/access.2016.2633488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kassa, Yonas Mitike, Ruben Cuevas, and Angel Cuevas. "A Large-Scale Analysis of Facebook’s User-Base and User Engagement Growth." IEEE Access 6 (2018): 78881–91. http://dx.doi.org/10.1109/access.2018.2885458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deng, Kaikai, Ling Xing, Longshui Zheng, Honghai Wu, Ping Xie, and Feifei Gao. "A User Identification Algorithm Based on User Behavior Analysis in Social Networks." IEEE Access 7 (2019): 47114–23. http://dx.doi.org/10.1109/access.2019.2909089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tong, Shiyuan, Yun Liu, Mohamed Cheriet, Michel Kadoch, and Bo Shen. "UCAA: User-Centric User Association and Resource Allocation in Fog Computing Networks." IEEE Access 8 (2020): 10671–85. http://dx.doi.org/10.1109/access.2020.2965218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "User access"

1

Tukkensæter, Brage Rønning. "User Friendly Access Solutions for Mobile WiMAX." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9909.

Full text
Abstract:

Today, WiMAX networks are deployed several places worldwide. To get access to these networks, users have to buy equipment specialized for one operator with a subscription. User equipment has earlier been stationary or mounted, but with the Mobile WiMAX amendment, smaller receivers are made possible. Mobile WiMAX allows users to move between different operators, making user access and roaming a more challenging task. In this thesis, several Mobile WiMAX access solutions are discussed, emphasizing security and user friendliness. A captive portal solution is developed, and an EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) solution utilizing FreeRADIUS is planned. Security in WiMAX is compared to Wi-Fi very good. Even in an open WiMAX network traffic can be encrypted, this makes a WiMAX captive portal solution secure for most purposes. For traveling or visiting users, the EAP-TTLS solution may be complicated to use. Users need an account prior to the connection, or the visited operator needs roaming agreements with the user’s home operator. Roaming agreements are not common today, but is currently promoted by the WiMAX Forum. With the captive portal, users are able to buy access without having an account or subscription in advance. A captive portal solution is recommended for visiting users, and EAP-TTLS without roaming is recommended for users more permanently located in the operator’s area. EAP-based roaming may be deployed if roaming becomes more common in the future, but is not recommended today. In this thesis, several Mobile WiMAX access solutions are discussed, emphasizing security and user friendliness. A captive portal solution is developed, and an EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) solution utilizing FreeRADIUS is planned. Security in WiMAX is compared to Wi-Fi very good. Even in an open WiMAX network traffic can be encrypted, this makes a WiMAX captive portal solution secure for most purposes. For traveling or visiting users, the EAP-TTLS solution may be complicated to use. Users need an account prior to the connection, or the visited operator needs roaming agreements with the user’s home operator. Roaming agreements are not common today, but is currently promoted by the WiMAX Forum. With the captive portal, users are able to buy access without having an account or subscription in advance. A captive portal solution is recommended for visiting users, and EAP-TTLS without roaming is recommended for users more permanently located in the operator’s area. EAP-based roaming may be deployed if roaming becomes more common in the future, but is not recommended today.

APA, Harvard, Vancouver, ISO, and other styles
2

Serif, Tacha. "The mobile information access experience : a user perspective." Thesis, Brunel University, 2006. http://bura.brunel.ac.uk/handle/2438/7137.

Full text
Abstract:
Mobile technologies, such as mobile phones, smartphones and Palmtop computers, are in an upwards trend and earliest models of such devices are already available to end-users to communicate and access multimedia content on-the-move. As a logical outcome of this development in mobile technologies and devices, content provider companies have already started investing and piloting mobile multimedia content distribution and broadcasting technologies. Nevertheless, no matter how cutting-edge technology is and no matter how stylish the mobile devices are, the ultimate success of wireless communication technologies and devices are directly associated with the user adoption and embrace of these new equipment and technologies. In this perspective, since multimedia content, for mobile or not, is ultimately produced for the education and/or enjoyment of viewers, the user's perspective concerning the presentation quality is surely of equal importance as objective Quality of Service (QoS) technical parameters, to defining distributed multimedia quality. In order to comprehensively understand user experiences whilst accessing information using mobile devices and technologies, we investigate user-mobile device interaction and look into the surrounding issues in a uniform manner by combining multiple aspects: user initial device experience (Out-of-Box Experience), mobile information access in a real-world context, device impact on user information access and perceptually tailored multimedia content impact on user information assimilation and satisfaction. Accordingly, an extensive experimental investigation has been undertaken to see how user experiences varied based on device familiarity, device type, real-world context and variable locations. The findings has shown that the overall perception, and effectively the user information access experience, is affected and improved when multimedia content is tailored according to user device type and context. Thus highlights that the future of mobile computing necessitates two-faceted research, which should combine both a user as well as a technical perspective.
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Tae-Young. "User-activity aware strategies for mobile information access." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22595.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Raghupathy Sivakumar; Committee Member: Chuanyi Ji; Committee Member: George Riley; Committee Member: Magnus Egerstedt; Committee Member: Umakishore Ramachandran.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Chunsheng. "Spatial data : access and usability across the Internet." Thesis, Manchester Metropolitan University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.

Full text
Abstract:
With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility for PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation scheme can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Master of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
APA, Harvard, Vancouver, ISO, and other styles
6

Nilsson, Olof. "Access Barriers - from a user´s point of view." Doctoral thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-5799.

Full text
Abstract:
Abstract The aim of this thesis is to suggest a model to assist in the ability to judge access by private persons to Information Technology, IT, and to Public Information Sys-tems, PIS. It has its starting point in the Swedish Government´s endeavour to turn Sweden into the first information society for all. When the available statistics con-cerning the access to a PC and the Internet in Swedish homes are studied it is easy to think that this vision may soon be realised. Of course, access to the technical equipment is a fundamental condition in order to be able to use the Public Informa-tion Systems, but unfortunately, is not the only one. A number of studies have shown that it is not possible to equate possession and use. A number of access models or frameworks designed to judge whether or not a person has access to the ICTs do exist. However, it is my opinion that there is a de-ficiency in these models; they do not start out from the individual user´s prerequi-sites, but rather judge the external conditions available for possible access. Assisted by four empirical studies, interviews and questionnaires, a number of ac-cess barriers experienced by the users have been identified. The studies show that in addition to the technological hindrances, a series of more elusive ones also exist originating from prevailing norms and values in the environment the user lives in. The barriers are categorised into five groups; to have, to be able, to will, to may and to dare. Together these notions form the User Centred Access Model, UCAM, which is suggested for use in charting and communicating the necessary considera-tions that must be taken into account in the development of Public Information Sys-tems. KeywordsLanguage
PI - Publika Informationssystem
APA, Harvard, Vancouver, ISO, and other styles
7

Klas, Claus-Peter Goevert Norbert Fuhr Norbert. "Distributed agents for user-friendly access of Digital Libraries." Gerhard-Mercator-Universitaet Duisburg, 2004. http://www.ub.uni-duisburg.de/ETD-db/theses/available/duett-04232004-151931/.

Full text
Abstract:
Despite the fact that many Digital Libraries (DLs) are available on the Internet, users cannot effectively use them because of inadequate functionality, deficient visualisation and insufficient integration of different DLs. In the framework of this project we develop a user-oriented access system for DLs which overcomes these drawbacks. Based on experiences from the librarian area, higher functions to assist proved search strategies will be implemented. Different DLs will be tightly integrated, so that system-wide search and navigation is possible. The system will be adaptive towards different user wishes, regarding preferences concerning content and system involvement.
APA, Harvard, Vancouver, ISO, and other styles
8

Head, Milena M. "User interface features, facilitating information access and decision making." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0007/NQ42743.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Head, Milena M. "User interface features : facilitating information access and decision making /." *McMaster only, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Hui. "Mining novel Web user behavior models for access prediction /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WANG.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003.
Includes bibliographical references (leaves 83-91). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "User access"

1

Jasper, Kim. User access & information protection: Managing open access & information protection. Hamburg [Germany]: PROJECT CONSULT, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gleason, Bernard W. Open access: A user information system. Boulder, Colo. (4840 Pearl East Circle, Suite 302E, Boulder 80301): CAUSE, the Association for the Management of Information Technology in Higher Education, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kavanagh, Chapman Kathleen, and Leben Joe, eds. Systems application architecture: Common user access. Englewood Cliffs, N.J: Prentice-Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

David, Mercer. Microsoft Access 97: Microsoft Office user specialist. Scottsdale, Ariz: Certification Insider Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Corporation, Quarterdeck. Procomm RapidRemote: User guide. Marina del Rey, CA: Quarterdeck, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hunter, J. NASA access mechanism: Graphical user interface information retrieval system. [Washington, DC]: National Aeronautics and Space Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ercegovac, Zorana. Information access instruction. Los Angeles: InfoEN Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Perth & Kinross Council. Housing & Community Care. Making access easier for you: Service user issues & suggested actions. Perth: Perth & Kinross Council, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Helme, Arne. A system for secure user-controlled electronic transactions. Maastricht: Shaker Publishing, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1954-, Slack Frances, ed. Designing public access systems. Aldershot: Gower, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "User access"

1

Kahlout, Gabriele. "User access." In Spinning Up ServiceNow, 41–56. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2571-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Siriwardena, Prabath. "User-Managed Access." In Advanced API Security, 277–86. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-2050-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schwartz, Michael, and Maciej Machulak. "User-Managed Access." In Securing the Perimeter, 267–99. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-2601-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petritsch, Helmut. "User Information: At-Access." In Break-Glass, 93–105. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-07365-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siriwardena, Prabath. "User Managed Access (UMA)." In Advanced API Security, 155–70. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Collins, Mark. "Enhancing the User Experience." In Pro Access 2010 Development, 255–89. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3579-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pazzani, Michael. "Adaptive Interfaces for Ubiquitous Web Access." In User Modeling 2003, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44963-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gori, Marco, Marco Maggini, and Enrico Martinelli. "Web-Browser Access Through Voice Input and Page Interest Prediction." In User Modeling, 17–19. Vienna: Springer Vienna, 1997. http://dx.doi.org/10.1007/978-3-7091-2670-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stockhause, Martina. "User Driven Data Access Mechanisms." In Earth System Modelling - Volume 6, 33–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37244-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sieberichs, Dagmar, and Hans-Joachim Krüger. "Die ‘Access User Group’ entsteht." In Vieweg Software-Trainer Microsoft Access für Windows, 163–210. Wiesbaden: Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-89437-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "User access"

1

Kalman, Gyorgy, and Josef Noll. "User controlled content access." In 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hammann, Sven, Saša Radomirović, Ralf Sasse, and David Basin. "User Account Access Graphs." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3354193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neat, Leo, Ren Peng, Siyang Qin, and Roberto Manduchi. "Scene text access." In IUI '19: 24th International Conference on Intelligent User Interfaces. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3301275.3302271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, M. A., M. Kornacker, and J. M. Hellerstein. "Amdb: a visual access method development tool." In Proceedings User Interfaces to Data Intensive Systems. IEEE, 1999. http://dx.doi.org/10.1109/uidis.1999.791469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fröhlich, B., J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. L. Yuan, and A. J. Shields. "A Multi-User Quantum Access Network." In CLEO: QELS_Fundamental Science. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/cleo_qels.2013.qtu2c.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Serafimovski, Nikola, Sinan Sinanovic, Abdelhamid Younis, Marco Di Renzo, and Harald Haas. "2-User multiple access spatial modulation." In 2011 IEEE Globecom Workshops. IEEE, 2011. http://dx.doi.org/10.1109/glocomw.2011.6162467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seraghiti, Andrea, and Alessandro Bogliolo. "User-Provided Wireless Neutral Access Networks." In 2010 Second International Conference on Advances in Future Internet (AFIN). IEEE, 2010. http://dx.doi.org/10.1109/afin.2010.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Su, Linying. "User Behaviour Based Access Control Decision." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Machulak, Maciej P., Eve L. Maler, Domenico Catalano, and Aad van Moorsel. "User-managed access to web resources." In the 6th ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866855.1866865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saidi, Samia, Yahya Slimani, and Khedija Arour. "Webview selection from user access patterns." In the ACM first Ph.D. workshop in CIKM. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1316874.1316901.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "User access"

1

RamaRao, Saumya, Wilson Liambila, Fatou Mbow, and Avishek Hazra. Infographic—Getting to market: Roadmap for user access. Population Council, 2020. http://dx.doi.org/10.31899/rh13.1020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kazakos, D., and I. Stavrakakis. A Multi User Random Access Communication System for Users with Different Priorities. Fort Belvoir, VA: Defense Technical Information Center, February 1987. http://dx.doi.org/10.21236/ada186041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sciberras, A., ed. Lightweight Directory Access Protocol (LDAP): Schema for User Applications. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Long, A. C., Courtney Moskowitz, and Greg Ganger. A Prototype User Interface for Coarse-Grained Desktop Access Control. Fort Belvoir, VA: Defense Technical Information Center, November 2003. http://dx.doi.org/10.21236/ada488514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sellers, C., B. Fox, and J. Paulz. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability. Office of Scientific and Technical Information (OSTI), March 1996. http://dx.doi.org/10.2172/204135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, S. K., J. C. Prather, E. K. Ligotke, and C. R. Watson. National Radiobiology Archives Distributed Access User`s Manual, Version 1.1. Revision 1. Office of Scientific and Technical Information (OSTI), June 1992. http://dx.doi.org/10.2172/10183970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nelson, D., and G. Weber. Remote Authentication Dial-In User Service (RADIUS) Authorization for Network Access Server (NAS) Management. RFC Editor, July 2009. http://dx.doi.org/10.17487/rfc5607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stavrakakis, I., and D. Kazakos. On the Approximation of the Output Process of Multi-User Random Access Communication Networks. Fort Belvoir, VA: Defense Technical Information Center, June 1987. http://dx.doi.org/10.21236/ada186197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mackley, Rob D., George V. Last, and Craig H. Allwardt. Hanford Borehole Geologic Information System (HBGIS) Updated User?s Guide for Web-based Data Access and Export. Office of Scientific and Technical Information (OSTI), September 2008. http://dx.doi.org/10.2172/969742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chaudhary, Aashish. Climatepipes: User-friendly data access, data manipulation, data analysis and visualization of community climate models Phase II. Office of Scientific and Technical Information (OSTI), September 2015. http://dx.doi.org/10.2172/1213562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography