Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Access sharing.

Rozprawy doktorskie na temat „Access sharing”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Access sharing”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Beiter, Bernd Michael. "Secret sharing schemes on general access structures /." Aachen : Shaker, 2008. http://d-nb.info/991819993/04.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sleeper, Manya. "Everyday Online Sharing." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/881.

Pełny tekst źródła
Streszczenie:
People make a range of everyday decisions about how and whether to share content with different people, across different platforms and services, during a variety of tasks. These sharing decisions can encompass complex preferences and a variety of access-control dimensions. In this thesis I examine potential methods for improving sharing mechanisms by better understanding the everyday online sharing environment and evaluating a potential sharing tool. I first present two studies that explore how current sharing mechanisms may fall short on social networking sites, leading to suboptimal outcomes
Style APA, Harvard, Vancouver, ISO itp.
3

Kaskaloglu, Kerem. "Some Generalized Multipartite Access Structures." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611965/index.pdf.

Pełny tekst źródła
Streszczenie:
In this work, we study some generalized multipartite access structures and linear secret sharing schemes for their realizations. Given a multipartite set of participants with m compartments (or levels) and m conditions to be satisfied by an authorized set, we firstly examine the intermediary access structures arousing from the natural case concerning that any c out of m of these conditions suffice, instead of requiring anyone or all of the m conditions simultaneously, yielding to generalizations for both the compartmented and hierarchical cases. These are realized essentially by employing a se
Style APA, Harvard, Vancouver, ISO itp.
4

Kayem, Anne Voluntas dei Massah. "Adaptive Cryptographic Access Control for Dynamic Data Sharing Environments." Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1557.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

He, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.

Pełny tekst źródła
Streszczenie:
Au cours de ces dernières années, de plus en plus d’utilisateurs choisissent de diffuser leurs photos sur des plateformes de partage d’images. Ces plateformes permettent aux utilisateurs de restreindre l’accès aux images à un groupe de personnes, afin de donner un sentiment de confiance aux utilisateurs vis-à-vis de la confidentialité de ces images. Malheureusement, la confidentialité ne peut être garantie sachant que le fournisseur de la plateforme a accès aux contenus de n’importe quelle image publiée sur sa plateforme. En revanche, si les images sont mises en ligne chiffrées, seules les per
Style APA, Harvard, Vancouver, ISO itp.
6

Brahma, Swastik Kumar. "Spectrum sharing and service pricing in dynamic spectrum access networks." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4854.

Pełny tekst źródła
Streszczenie:
Traditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the spectrum to higher valued uses, thereby resulting in inefficient spectrum utilization (23, 38, 42, 62, 67).
Style APA, Harvard, Vancouver, ISO itp.
7

Fu, Kevin E. (Kevin Edward) 1976. "Group sharing and random access in cryptographic storage file systems." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80534.

Pełny tekst źródła
Streszczenie:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.<br>Vita.<br>Includes bibliographical references (p. 79-83).<br>by Kevin E. Fu.<br>M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
8

Lee, Haeyoung. "Dynamic spectrum sharing by opportunistic spectrum access with spectrum aggregation." Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/807078/.

Pełny tekst źródła
Streszczenie:
The rapid growth of wireless services and the breakneck proliferation of wireless devices continue to strain limited spectrum resource. While the need for efficient spectrum sharing mechanisms has been emphasized, opportunistic spectrum access has been considered as a promising mechanism for dynamic spectrum sharing. However, although the idle spectrum could exist, it is usually rather fragmented and distributed, and hence the secondary network users would face the difficulty in finding required contiguous spectrum. Spectrum aggregation can be exploited to provide effective wide bandwidth comm
Style APA, Harvard, Vancouver, ISO itp.
9

Tercero, Vargas Miurel. "Topics in Dynamic Spectrum Access : Market Based Spectrum Sharing and Secondary User Access in Radar Bands." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33791.

Pełny tekst źródła
Streszczenie:
The steady growth in demand for spectrum has increased research interest in dynamic spectrum access schemes. This thesis studies some challenges in dynamic spectrum access based on two strategies: open sharing and hierarchical access. (1) In the open sharing model, the channels are allocated based on an auction process, taking into account the propagation characteristics of the channels, termed as channel heterogeneity. Two distributed dynamic spectrum access schemes are evaluated, sequential and concurrent. We show that the concurrent accessmechanismperforms better in terms of channel utiliza
Style APA, Harvard, Vancouver, ISO itp.
10

Attia, Tarek. "Band sharing and satellite diversity techniques for CDMA." Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/842977/.

Pełny tekst źródła
Streszczenie:
High levels of interference between satellite constellation systems, fading and shadowing are a major problem for the successful performance of communication systems using the allocated L/S frequency bands for Non-Geostationary Earth Orbit (NGEO) satellites. As free spectrum is nonexistent, new systems wishing to operate in this band must co-exist with other users, both satellite and terrestrial. This research is mainly concerned with two subjects. Firstly, band sharing between different systems Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) has been evaluated fo
Style APA, Harvard, Vancouver, ISO itp.
11

MacPherson, Lesley. "Grey Level Visual Cryptography for General Access Structures." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1126.

Pełny tekst źródła
Streszczenie:
Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the image without any computation. In 2000, Blundo, De Santis, and Naor introduced a model for grey-level visual cryptography which is a generalization of visual cryptography for general access structures. Grey-level visual cryptography extends this model to include grey-scale images. Decoding is done by the human visual system. In this thesis we survey known results
Style APA, Harvard, Vancouver, ISO itp.
12

Mazurek, Michelle L. "A Tag-Based, Logical Access-Control Framework for Personal File Sharing." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/325.

Pełny tekst źródła
Streszczenie:
People store and share ever-increasing numbers of digital documents, photos, and other files, both on personal devices and within online services. In this environment, proper access control is critical to help users obtain the benefits of sharing varied content with different groups of people while avoiding trouble at work, embarrassment, identity theft, and other problems related to unintended disclosure. Current approaches often fail, either because they insufficiently protect data or because they confuse users about policy specification. Historically, correctly managing access control has p
Style APA, Harvard, Vancouver, ISO itp.
13

Dursun, Mustafa. "Data Sharing And Access With A Corba Data Distribution Service Implementation." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607681/index.pdf.

Pełny tekst źródła
Streszczenie:
Data Distribution Service (DDS) specification defines an API for Data-Centric Publish-Subscribe (DCPS) model to achieve efficient data distribution in distributed computing environments. Lack of definition of interoperability architecture in DDS specification obstructs data distribution between different and heterogeneous DDS implementations. In this thesis, DDS is implemented as a CORBA service to achieve interoperability and a QoS policy is proposed for faster data distribution with CORBA features.
Style APA, Harvard, Vancouver, ISO itp.
14

Hultell, Johan. "Cooperative and non-cooperative wireless access : Resource and infrastructure sharing regimes." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9680.

Pełny tekst źródła
Streszczenie:
Future wireless networks will combine multiple radio technologies and subsystems, possibly managed by competing network providers. For such systems it may be advantageous to let the end nodes (terminals) make some or all of the resource management decisions. In addition to reducing complexity and costs, increasing redundancy, and facilitating more timely decisions; distributed resource sharing regimes can decouple the individual subsystems. Decoupled subsystems could be desirable both because competing operators can be business-wise separated and because it allows new technologies to be added
Style APA, Harvard, Vancouver, ISO itp.
15

Gonzalez, Sanchez Dina Pamela. "Resource Sharing and Network Deployment Games : In Open Wireless Access Markets." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-39480.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Bany, Salameh Haythem Ahmad Mohammed. "Channel Access Mechanisms and Protocols for Opportunistic Cognitive Radio Networks." Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/193865.

Pełny tekst źródła
Streszczenie:
High traffic load over the unlicensed portion of the radiospectrum (a.k.a., ISM bands) along with inefficient usage of thelicensed spectrum gave impetus for a new paradigm in spectrumallocation, whose main purpose is to improve spectrum efficiencythrough opportunistic access. Cognitive radios (CRs) havebeen proposed as a key enabling technology for such paradigm.Operating a CR network (CRN) without impacting the performance oflicensed (primary) users requires new protocols for informationexchange as well as mathematical tools to optimize thecontrollable parameters of the CRN. In this dissertat
Style APA, Harvard, Vancouver, ISO itp.
17

Morrison, Heather. "The dramatic growth of open access : implications and opportunities for resource sharing." Haworth Press, 2006. http://hdl.handle.net/2429/953.

Pełny tekst źródła
Streszczenie:
The Open Access movement seeks to make scholarly, peer-reviewed journal articles freely available to anyone, anywhere over the World Wide Web. There were some very significant developments in the area of Open Access (OA) in 2004, including statements by major funders in support of Open Access. There are now so many Open Access scholarly journal articles freely available, that, in the author’s opinion, being aware of, and using, the resources and related tools is now essential for libraries. Libraries can provide more resources faster for users by supplementing paid resources with ones that are
Style APA, Harvard, Vancouver, ISO itp.
18

Koppenhafer, Leslie. "Accounting for the Social Element in Access-Based Consumption." Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18511.

Pełny tekst źródła
Streszczenie:
This dissertation examines how the inclusion of the social element in access-based consumption can influence affective and behavioral responses. The first essay builds upon the dimensions proposed by Bardhi and Eckhardt, who found that market mediation, anonymity, temporality, consumer involvement, type of accessed object and political consumerism are key dimensions on which to study access-based consumption. A reconceptualization of these dimensions is proposed in the current work to incorporate the social element. Foremost, a separation of renting and sharing based on the presence or absence
Style APA, Harvard, Vancouver, ISO itp.
19

Rakshit, Sudipta. "ACCESS GAMES: A GAME THEORETIC FRAMEWORK FOR FAIR BANDWIDTH SHARING IN DISTRIBUTED SYSTEMS." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2444.

Pełny tekst źródła
Streszczenie:
In this dissertation, the central objective is to achieve fairness in bandwidth sharing amongst selfish users in a distributed system. Because of the inherent contention-based nature of the distributed medium access and the selfishness of the users, the distributed medium access is modeled as a non-cooperative game; designated as the Access Game. A p-CSMA type medium access scenario is proposed for all the users. Therefore, in the Access Game, each user has two actions to choose from: "transmit" and "wait". The outcome of the Access Game and payoffs to each user depends on the actions taken by
Style APA, Harvard, Vancouver, ISO itp.
20

Sacramento, Junior Luiz Claudio Ferreira. "More than words: broader information sharing and access to the formal credit market." reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/18293.

Pełny tekst źródła
Streszczenie:
Submitted by Luiz Claudio Ferreira Sacramento Junior (luizclaudiosacramento@hotmail.com) on 2017-05-22T23:07:02Z No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5)<br>Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2017-05-23T19:21:16Z (GMT) No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5)<br>Made available in DSpace on 2017-05-30T18:56:11Z (GMT). No. of bitstreams: 1 Dissertation_final version.docx: 377
Style APA, Harvard, Vancouver, ISO itp.
21

Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Oyediran, David. "Spectrum Sharing: Overview and Challenges of Small Cells Innovation in the Proposed 3.5 GHz Band." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596402.

Pełny tekst źródła
Streszczenie:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>Spectrum sharing between Federal and commercial users is a technique proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use and small cell technology is one of the candidates for its' realization. The traffic on small cells is temporal and their chances of interfering with other services in shared spectrum are limited. DoD has a documented requirement of 865 MHz by 202
Style APA, Harvard, Vancouver, ISO itp.
23

Bennis, M. (Mehdi). "Spectrum sharing for future mobile cellular systems." Doctoral thesis, University of Oulu, 2009. http://urn.fi/urn:isbn:9789514260582.

Pełny tekst źródła
Streszczenie:
Abstract Spectrum sharing has become a high priority research area over the past few years. The motivation behind this lies in the fact that the limited spectrum is currently inefficiently utilized. As recognized by the World radio communication conference (WRC)-07, the amount of identified spectrum is not large enough to support large bandwidths for a substantial number of operators. Therefore, it is paramount for future mobile cellular systems to share the frequency spectrum and coexist in a more efficient manner. The present dissertation deals with the problem of spectrum scarcity by exam
Style APA, Harvard, Vancouver, ISO itp.
24

Sohul, Munawwar Mahmud. "Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/88018.

Pełny tekst źródła
Streszczenie:
The radio spectrum dependent applications are facing a huge scarcity of the resource. To address this issue, future wireless systems require new wireless network architectures and new approaches to spectrum management. Spectrum sharing has emerged as a promising solution to address the radio frequency (RF) spectrum bottleneck. Although spectrum sharing is intended to provide flexible use of the spectrum, the architecture of the existing approaches, such as TV White Space [1] and Citizen Broadband Radio Services (CBRS) [2], have a relatively fixed sharing framework. This fixed structure limits
Style APA, Harvard, Vancouver, ISO itp.
25

Padaki, Aditya V. "Fundamentals of Efficient Spectrum Access and Co-existence with Receiver Nonlinearity." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81958.

Pełny tekst źródła
Streszczenie:
RF front-ends are nonlinear systems that have nonlinear frequency response and, hence, can impair receiver performance by harmful adjacent channel interference in non-intuitive ways. Next generation wireless networks will see unprecedented diversity across receiver and radio technologies accessing the same band of spectrum in spatio-temporal proximity. Ensuring adjacent channel co-existence is of prime importance for successful deployment and operations of next generation wireless networks. Vulnerabilities of receiver front-end can have a severe detrimental effect on network performance and sp
Style APA, Harvard, Vancouver, ISO itp.
26

Bhattarai, Sudeep. "Spectrum Efficiency and Security in Dynamic Spectrum Sharing." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82872.

Pełny tekst źródła
Streszczenie:
We are in the midst of a major paradigm shift in how we manage the radio spectrum. This paradigm shift in spectrum management from exclusive access to shared access is necessitated by the growth of wireless services and the demand pressure imposed on limited spectrum resources under legacy management regimes. The primary constraint in any spectrum sharing regime is that the incumbent users (IUs) of the spectrum need to be protected from harmful interference caused due to transmissions from secondary users (SUs). Unfortunately, legacy techniques rely on inadequately flexible and overly conserva
Style APA, Harvard, Vancouver, ISO itp.
27

Johansson, Klas. "Cost efficient provisioning of wireless access : infrastructure cost modeling and multi-operator resource sharing." Licentiate thesis, KTH, Skolan för elektro- och systemteknik (EES), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-580.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Zhang, Jie. "Impact of disk access on the performance of load sharing policies in distributed systems." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq36882.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Chennells, Roger Scarlin. "Equitable access to human biological resources in developing countries : benefit sharing without undue inducement." Thesis, University of Central Lancashire, 2014. http://clok.uclan.ac.uk/10634/.

Pełny tekst źródła
Streszczenie:
The main research question of this thesis is: How can cross-border access to human genetic resources, such as blood or DNA samples, be governed to achieve equity for developing countries? Access to and benefit sharing for human biological resources is not regulated through an international legal framework such as the Convention on Biological Diversity, which applies only to plants, animals and micro-organisms as well as associated traditional knowledge. This legal vacuum for the governance of human genetic resources can be attributed (in part) to the concern that benefit sharing might provide
Style APA, Harvard, Vancouver, ISO itp.
30

Yu, Shucheng. "Data Sharing on Untrusted Storage with Attribute-Based Encryption." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/321.

Pełny tekst źródła
Streszczenie:
"Storing data on untrusted storage makes secure data sharing a challenge issue. On one hand, data access policies should be enforced on these storage servers; on the other hand, confidentiality of sensitive data should be well protected against them. Cryptographic methods are usually applied to address this issue -- only encrypted data are stored on storage servers while retaining secret key(s) to the data owner herself; user access is granted by issuing the corresponding data decryption keys. The main challenges for cryptographic methods include simultaneously achieving system scalability and
Style APA, Harvard, Vancouver, ISO itp.
31

Jiang, Xueyuan. "Dynamic spectrum sharing for future wireless communications." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:d0ce0b24-9f97-476a-bf87-dc34f1a8154e.

Pełny tekst źródła
Streszczenie:
The spectrum has become one of the most important and scarce resources for future wireless communications. However, the current static spectrum policy cannot meet the increasing demands for spectrum access. To improve spectrum efficiency, dynamic spectrum access (DSA) attempts to allocate the spectrum to users in an intelligent manner. Cognitive radio (CR) is an enabling technology for DSA, and can maximize spectrum utilization by introducing unlicensed or secondary users (SUs) to the primary system. The key component of DSA is dynamic spectrum sharing (DSS), which is responsible for providing
Style APA, Harvard, Vancouver, ISO itp.
32

Morelli, Vincenzo. "APostrophe WiFi Sharing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14419/.

Pełny tekst źródła
Streszczenie:
Negli ultimi anni il tema dell’economia della condivisione ha assunto un piano sempre più attuale, lo sviluppo delle tecnologie mobile, contempora- neamente, è in continua ed esponenziale crescita, le applicazioni necessitano sempre più di un accesso alla rete internet sicuro ed efficiente. Questa tesi è incentrata sullo sviluppo di un’applicazione per sistemi An- droid che consenta la creazione di un network di utenti e permetta loro di condividere il proprio router casalingo. I dispositivi condivisi saranno collocati sulla mappa tramite un algoritmo di posizionamento che abbina le mecc
Style APA, Harvard, Vancouver, ISO itp.
33

Lawrence-Kuether, Maureen Anne. "Beyond the Paywall: Examining Open Access and Data Sharing Practices Among Faculty at Virginia Tech Through the Lens of Social Exchange." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78236.

Pełny tekst źródła
Streszczenie:
The movement towards open access has allowed academic researchers to communicate and share their scholarly content more widely by being freely available to Internet users. However, there are still issues of concern among faculty in regards to making their scholarly output open access. This study surveyed Virginia Tech faculty (N = 264) awareness and attitudes toward open access practices. In addition, faculty were asked to identify factors that inhibited or encouraged their participation in open access repositories. Findings indicate that while the majority of Virginia Tech faculty are see
Style APA, Harvard, Vancouver, ISO itp.
34

Farhat, Soha. "Access Selection and Pricing in Multi-operator Wireless Networks." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S029/document.

Pełny tekst źródła
Streszczenie:
Notre travail se situe dans le contexte de partage de réseau mobile actif, ou un nombre d'opérateurs partagent leur accès radio, afin de former un système multi-technologie multi-opérateur. Le but de notre étude est de montrer les avantages de la coopération entre les opérateurs, principalement en ce qui concerne les revenus. De plus, nous cherchons des stratégies pour surpasser les conséquences négatives du partage des ressources, surtout celles touchant la performance des réseaux des opérateurs coopérants. Nous avons montré que les bénéfices de la coopération dépendent fortement du choix de
Style APA, Harvard, Vancouver, ISO itp.
35

Gao, Bo. "Coexistence of Wireless Networks for Shared Spectrum Access." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/50525.

Pełny tekst źródła
Streszczenie:
The radio frequency spectrum is not being efficiently utilized partly due to the current policy of allocating the frequency bands to specific services and users. In opportunistic spectrum access (OSA), the ``white spaces'' that are not occupied by primary users (a.k.a. incumbent users) can be opportunistically utilized by secondary users. To achieve this, we need to solve two problems: (i) primary-secondary incumbent protection, i.e., prevention of harmful interference from secondary users to primary users; (ii) secondary-secondary network coexistence, i.e., mitigation of mutual interference a
Style APA, Harvard, Vancouver, ISO itp.
36

Furuskär, Anders. "Radio resource sharing and bearer service allocation for multi-bearer service, multi-access wireless networks." Doctoral thesis, KTH, Signals, Sensors and Systems, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3502.

Pełny tekst źródła
Streszczenie:
<p>Two expected characteristics of future wireless networks aresupport for multiple bearer services, which in turn enablemultiple end-user services, and the parallel use of multipleradio access technologies. This dissertation discusses radioresource management principles to improve capacity for suchmulti-bearer service, multi-access networks.</p><p>More specifically, it is first focused on how to mostefficiently share the radio resource between bearer servicegroups within one access technology. A general principle forsharing resources in interference limited systems is proposed,and its expecte
Style APA, Harvard, Vancouver, ISO itp.
37

Bian, Kaigui. "Medium Access Control in Cognitive Radio Networks." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37591.

Pełny tekst źródła
Streszczenie:
Cognitive radio (CR) is seen as one of the enabling technologies for realizing a new regulatory spectrum management paradigm, viz. opportunistic spectrum sharing (OSS). In the OSS paradigm, unlicensed users (a.k.a. secondary users) opportunistically operate in fallow licensed spectrum on a non-interference basis to licensed users (a.k.a. incumbent or primary users). Incumbent users have absolute priority in licensed bands, and secondary users must vacate the channel where incumbent user signals are detected. A CR network is composed of secondary users equipped with CRs and it can coexist with
Style APA, Harvard, Vancouver, ISO itp.
38

Srinivas, Preethi. "Private Key Allocation based Access Control Scheme for Social Networks." Miami University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=miami1281839737.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Katsouraki, Athanasia. "Sharing and Usage Control of Personal Information." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV089/document.

Pełny tekst źródła
Streszczenie:
Nous vivons une véritable explosion du volume des données personnelles numériques qui sont générés dans le monde chaque jour (ex. capteurs, web, réseaux sociaux, etc.). En conséquence, les particuliers se sentent exposés tandis qu'ils partagent et publient leurs données. Ainsi, il est clair que des outils et des méthodes sont nécessaires pour contrôler la façon dont leurs données sont collectées, gérées et partagées. Les défis sont principalement axées sur le manque d'applications ou de solutions techniques qui assurent la gestion et le partage sécurisés de données personnelles. Le défi princi
Style APA, Harvard, Vancouver, ISO itp.
40

Hermansson, Rickard, and Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents." Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.

Pełny tekst źródła
Streszczenie:
A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments.This paper shows different systems and models for access control, version control,and distribution of the documents that can be used to create asystem that solves theseproblems.One requirement for this system was a user interface where users can upload, down-load and manage access to their documents. Another requirement was a service thathan
Style APA, Harvard, Vancouver, ISO itp.
41

Houghton, David Michael. "To Have or to Hold: The Role of Psychological Ownership in the Perceived Value of Owned and Accessed Goods." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/dissertations/1155.

Pełny tekst źródła
Streszczenie:
Whether they are renting a neighbor’s used tools, using a bike sharing program to get to work rather than owning a car, or streaming a movie online through Netflix, consumers are forgoing traditional ownership of goods in favor of gaining mere access to them. This behavior reflects a change in the way consumers view possession and ownership. While it is known that consumers become attached to possessions and that possessions mean a great deal to the identities and lives of consumers, it is unclear how consumers feel about goods which they can possess and use but do not own. Specifically, it is
Style APA, Harvard, Vancouver, ISO itp.
42

Kelly, Justin. "On the Benefit of Cooperation of Secondary Users in Dynamic Spectrum Access." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/76835.

Pełny tekst źródła
Streszczenie:
For the past 70 years, the Federal Communications Commission (FCC) has been the licensing authority for wireless spectrum. Traditionally, spectrum was commercially licensed to primary users with defined uses. With the growth of personal communication systems in the 1990''s, unallocated spectrum has become a scarce commodity. However, since most primary users are active only at certain times and places, much of the allocated spectrum remains underutilized. Substantial holes exist in the spatio-temporal spectrum that could be opportunistically used by unlicensed secondary users. As a result, the
Style APA, Harvard, Vancouver, ISO itp.
43

Short, Patricia Margaret. "Association, reciprocity, sharing and dependency : conditions of access and forms of inequality beyond the market state /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18178.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Alemu, Getaneh Agegn. "The Role of Open Access in Fostering Knowledge Sharing and Collaboration in Ethiopia: a case study." Thesis, Tallinn University, 2009. http://hdl.handle.net/10919/71501.

Pełny tekst źródła
Streszczenie:
This study adopts a qualitative approach and uses the case study method. Fourteen researchers and librarians were interviewed in four organizations in Addis Ababa, Ethiopia.The responses based on the semi-structured interviews provide information about the current status of scholarly communication, the awareness of researchers and librarians about open access and the actual and potential challenges in implementing open access strategies in Ethiopia. This research is believed to illuminate the practicalities and procedures of how open access scholarly communication models could foster and suppo
Style APA, Harvard, Vancouver, ISO itp.
45

Lowman, Michael. "The effectiveness of access and benefit-sharing legislation in South Africa: practical considerations for national regimes." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12090.

Pełny tekst źródła
Streszczenie:
Includes abstract.<br>Includes bibliographical references.<br>The Convention on Biological Diversity provides an international regulatory framework for countries to develop their own access and benefit-sharing (ABS) legislation. This international convention governs the utilization of a country's genetic resources and associated traditional knowledge. Due to increased capabilities and demand from industry for these resources, a market is created over which ABS legislation is to govern. This is based on the realization of the objectives of the convention that provide for state sovereignty over
Style APA, Harvard, Vancouver, ISO itp.
46

Changyan, Yi. "Auction-based Spectrum Sharing in Multi-Channel Cognitive Radio Networks with Heterogeneous Users." IEEE Transactions on Vehicular Technology, 2014. http://hdl.handle.net/1993/23943.

Pełny tekst źródła
Streszczenie:
Dynamic spectrum access based on cognitive radio has been regarded as a prospective solution to improve spectrum utilization for wireless communications. By considering the allocation efficiency, fairness, and economic incentives, spectrum marketing has been attracting more and more attentions in recent years. In this thesis, we focus on one of the most effective spectrum marketing methods, i.e., auction approach, in multi-channel cognitive radio networks. After presenting some fundamentals and related works, we begin our discussion in a recall-based auction system where buyers have vari
Style APA, Harvard, Vancouver, ISO itp.
47

Örn, Sagrelius Lizzie. "Fair and Equitable Participation? : A case study of access and benefit sharing processes in India and Samoa." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-305362.

Pełny tekst źródła
Streszczenie:
The third main objective of the Convention on Biological Diversity aims to guarantee that the process of using traditional knowledge in research and development of new products is fair and equitable. The framework put in place for implementing this third objective, access and benefit sharing, is supposed to enable and ensure the participation of traditional knowledge holders. Using a qualitative study to examine two cases of access and benefit sharing, the TBGRI-Kani case and the Samoan-Mamala case, this thesis seeks to develop an understanding of how power structures affect these processes. D
Style APA, Harvard, Vancouver, ISO itp.
48

Popov, Aleko Ivaylov, and Yashaswini Ravi. "Conceptualization of service loyalty in access-based services in micromobility : A case of e-scooter sharing services." Thesis, Linköpings universitet, Företagsekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166570.

Pełny tekst źródła
Streszczenie:
Background: Provide insights on the potential drivers of service loyalty in access-based services, especially when the consumers have the option to switch between owning a product or accessing a product through a service. By examining service loyalty in access-based services in the context of e-scooter sharing services, the researchers contribute to the service research field. Aim: Conceptualize service loyalty by considering the ownership dilemma in access-based services in micromobility. More specifically, the study aims to find what are potential drivers of service loyalty, what effects doe
Style APA, Harvard, Vancouver, ISO itp.
49

Giang, Truong Minh Triet, and trietgiang@yahoo com. "Efficient Admission Control Schemes in Cellular IP Networks." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20060829.113000.

Pełny tekst źródła
Streszczenie:
The thesis reviews current admission control schemes in cellular IP networks. It proposes an improved version of Threshold Access Sharing and a new scheme: weight-based scheme. Finally, an admission control scheme for hierarchical cellular network is introduced.
Style APA, Harvard, Vancouver, ISO itp.
50

Bahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.

Pełny tekst źródła
Streszczenie:
Cognitive radios (CRs) are devices that are capable of sensing the spectrum and using its free portions in an opportunistic manner. The free spectrum portions are referred to as white spaces or spectrum holes. It is widely believed that CRs are one of the key enabling technologies for realizing a new regulatory spectrum management paradigm, viz. dynamic spectrum access (DSA). CRs often employ software-defined radio (SDR) platforms that are capable of executing artificial intelligence (AI) algorithms to reconfigure their transmission/reception (TX/RX) parameters to communicate efficiently while
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!