Artykuły w czasopismach na temat „Access sharing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Access sharing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Simpson, Donald B. "Resource Sharing = Access + Ownership:." Journal of Library Administration 20, no. 1 (March 27, 1995): 95–107. http://dx.doi.org/10.1300/j111v20n01_08.
Pełny tekst źródłaCornaglia, Bruno, Gavin Young, and Antonio Marchetta. "Fixed Access Network Sharing." Optical Fiber Technology 26 (December 2015): 2–11. http://dx.doi.org/10.1016/j.yofte.2015.07.008.
Pełny tekst źródłaKarr, Alan F. "Data Sharing and Access." Annual Review of Statistics and Its Application 3, no. 1 (June 2016): 113–32. http://dx.doi.org/10.1146/annurev-statistics-041715-033438.
Pełny tekst źródłaKerpez, Kenneth J., John M. Cioffi, Peter J. Silverman, Bruno Cornaglia, and Gavin Young. "Fixed Access Network Sharing." IEEE Communications Standards Magazine 1, no. 1 (March 2017): 82–89. http://dx.doi.org/10.1109/mcomstd.2017.1600001st.
Pełny tekst źródłaLyu, Yan, Victor C. S. Lee, Chi-Yin Chow, Joseph Kee-Yin Ng, Yanhua Li, and Jia Zeng. "R-Sharing: Rendezvous for Personalized Taxi Sharing." IEEE Access 6 (2018): 5023–36. http://dx.doi.org/10.1109/access.2017.2778221.
Pełny tekst źródłaMouw, James. "Access, ownership and resource sharing." Serials Review 22, no. 2 (June 1996): 95–96. http://dx.doi.org/10.1080/00987913.1996.10764314.
Pełny tekst źródłaWicks, P. "Sharing access might increase engagement." BMJ 341, dec20 2 (December 20, 2010): c7209. http://dx.doi.org/10.1136/bmj.c7209.
Pełny tekst źródłaOwens, Brian. "Data sharing: Access all areas." Nature 533, no. 7602 (May 2016): S71—S72. http://dx.doi.org/10.1038/533s71a.
Pełny tekst źródłaStępnicka, Nina, and Paulina Wiączek. "ACCESS ECONOMY AND SHARING ECONOMY IN THE LIGHT OF THE INNOVATION THEORY." PRACE NAUKOWE UNIWERSYTETU EKONOMICZNEGO WE WROCŁAWIU, no. 509 (2018): 396–405. http://dx.doi.org/10.15611/pn.2018.509.33.
Pełny tekst źródłaPosner, Beth, Jennifer DeVito, Katharine Haldeman, and Dennis Massie. "Reciprocal On-Site Access: Sharing Information by Sharing Library Spaces." Journal of Library Administration 60, no. 1 (January 2, 2020): 80–87. http://dx.doi.org/10.1080/01930826.2019.1685270.
Pełny tekst źródłaBegg, Norman. "Securely sharing access to sensitive data." Network Security 2013, no. 7 (July 2013): 15–18. http://dx.doi.org/10.1016/s1353-4858(13)70083-7.
Pełny tekst źródłaBarbosa, V. C., M. R. F. Benevides, and F. M. G. França. "Sharing Resources at Nonuniform Access Rates." Theory of Computing Systems 34, no. 1 (February 2000): 13–26. http://dx.doi.org/10.1007/s002240010008.
Pełny tekst źródłaTrevor, Jonathan, and David M. Hilbert. "AnySpot: Pervasive Document Access and Sharing." IEEE Pervasive Computing 6, no. 3 (July 2007): 76–84. http://dx.doi.org/10.1109/mprv.2007.50.
Pełny tekst źródłaJuergens, Bonnie, and Tim Prather. "The Resource Sharing Component of Access." Journal of Library Administration 20, no. 1 (March 27, 1995): 77–94. http://dx.doi.org/10.1300/j111v20n01_07.
Pełny tekst źródłaMaher, Diane. "Access, resource sharing and collection development." Serials Review 23, no. 3 (September 1997): 93–94. http://dx.doi.org/10.1080/00987913.1997.10764402.
Pełny tekst źródłaGarrison, Nanibaa' A., Krysta S. Barton, Kathryn M. Porter, Thyvu Mai, Wylie Burke, and Stephanie Russo Carroll. "Access and Management: Indigenous Perspectives on Genomic Data Sharing." Ethnicity & Disease 29, Supp (December 12, 2019): 659–68. http://dx.doi.org/10.18865/ed.29.s3.659.
Pełny tekst źródłaNordin, R., K. H. Hassan, Z. A. Zainol, R. Shapiee, F. Jalil, M. A. Witbrodt, and M. S. Hassan. "Regulating Access to Genetic Resources and the Sharing of Benefit Through the Sarawak Access Benefit-Sharing Legislation." Research Journal of Applied Sciences 7, no. 3 (March 1, 2012): 185–93. http://dx.doi.org/10.3923/rjasci.2012.185.193.
Pełny tekst źródłaPereira, Stacey, Richard Gibbs, and Amy McGuire. "Open Access Data Sharing in Genomic Research." Genes 5, no. 3 (August 29, 2014): 739–47. http://dx.doi.org/10.3390/genes5030739.
Pełny tekst źródłaBYUNG-WOON LYOU. "Access to Genetic Resources and Benefit Sharing." Journal of hongik law review 18, no. 2 (June 2017): 59–88. http://dx.doi.org/10.16960/jhlr.18.2.201706.59.
Pełny tekst źródłaJammalamadaka, Ravi Chandra, Sharad Mehrotra, Nalini Venkatasubramanian, and Kent Seamons. "DataVault: secure mobile access and data sharing." Network Security 2011, no. 5 (May 2011): 16–19. http://dx.doi.org/10.1016/s1353-4858(11)70052-6.
Pełny tekst źródłaShabani, Mahsa, Danya Vears, and Pascal Borry. "Raw Genomic Data: Storage, Access, and Sharing." Trends in Genetics 34, no. 1 (January 2018): 8–10. http://dx.doi.org/10.1016/j.tig.2017.10.004.
Pełny tekst źródłaSaez, G., and C. Padro. "Secret sharing schemes with bipartite access structure." IEEE Transactions on Information Theory 46, no. 7 (2000): 2596–604. http://dx.doi.org/10.1109/18.887867.
Pełny tekst źródłaPritting, Shannon, William Jones, Timothy Jackson, and Michael Mulligan. "Enhancing Resource Sharing Access Through System Integration." Journal of Interlibrary Loan, Document Delivery & Electronic Reserve 26, no. 1 (January 1, 2017): 11–24. http://dx.doi.org/10.1080/1072303x.2017.1305034.
Pełny tekst źródłaYozwiak, Nathan L., Stephen F. Schaffner, and Pardis C. Sabeti. "Data sharing: Make outbreak research open access." Nature 518, no. 7540 (February 2015): 477–79. http://dx.doi.org/10.1038/518477a.
Pełny tekst źródłaChen, Hao, San Ling, and Chaoping Xing. "Access Structures of Elliptic Secret Sharing Schemes." IEEE Transactions on Information Theory 54, no. 2 (February 2008): 850–52. http://dx.doi.org/10.1109/tit.2007.913508.
Pełny tekst źródłaGómez-Castro, Beatriz, and Regina Kipper. "Nagoya Protocol on Access and Benefit-Sharing." Microbiology Australia 40, no. 3 (2019): 103. http://dx.doi.org/10.1071/ma19028.
Pełny tekst źródłaDhar, Biswajit, and R. V. Anuradha. "Access, Benefit-Sharing and Intellectual Property Rights." Journal of World Intellectual Property 7, no. 5 (November 1, 2005): 597–639. http://dx.doi.org/10.1111/j.1747-1796.2004.tb00221.x.
Pełny tekst źródłaQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Secret Sharing Scheme on Access Structure." Applied Mechanics and Materials 571-572 (June 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.
Pełny tekst źródłaHarinarayan, Venkatesh, and Leonard Kleinrock. "Load sharing in limited access distributed systems." ACM SIGMETRICS Performance Evaluation Review 19, no. 1 (June 2, 1991): 21–30. http://dx.doi.org/10.1145/107972.107975.
Pełny tekst źródłaIto, Mitsuru, Akira Saito, and Takao Nishizeki. "Secret sharing scheme realizing general access structure." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 72, no. 9 (1989): 56–64. http://dx.doi.org/10.1002/ecjc.4430720906.
Pełny tekst źródłaDufva, Martin. "Open access will deter illegal file-sharing." Nature 426, no. 6962 (November 2003): 15. http://dx.doi.org/10.1038/426015c.
Pełny tekst źródłaWang, Xianfang, Can Xiang, and Fang-Wei Fu. "Secret sharing schemes for compartmented access structures." Cryptography and Communications 9, no. 5 (September 20, 2016): 625–35. http://dx.doi.org/10.1007/s12095-016-0205-6.
Pełny tekst źródłaPriazhkina, Sofia, and Frank H. Page. "Sharing market access in buyer–seller networks." Journal of Economic Theory 175 (May 2018): 415–46. http://dx.doi.org/10.1016/j.jet.2018.01.017.
Pełny tekst źródłaYang, Siman, Hongfeng Wu, and Jiyou Li. "Access structures of hyperelliptic secret sharing schemes." Finite Fields and Their Applications 37 (January 2016): 46–53. http://dx.doi.org/10.1016/j.ffa.2015.09.002.
Pełny tekst źródłaHarn, Lein, Chingfang Hsu, Mingwu Zhang, Tingting He, and Maoyuan Zhang. "Realizing secret sharing with general access structure." Information Sciences 367-368 (November 2016): 209–20. http://dx.doi.org/10.1016/j.ins.2016.06.006.
Pełny tekst źródłaBaldini, Gianmarco, Igor Nai Fovino, Stefano Braghin, and Alberto Trombetta. "Distributed access control policies for spectrum sharing." Security and Communication Networks 6, no. 8 (September 19, 2012): 925–35. http://dx.doi.org/10.1002/sec.629.
Pełny tekst źródłaCao, Hao, and Wenping Ma. "Verifiable Threshold Quantum State Sharing Scheme." IEEE Access 6 (2018): 10453–57. http://dx.doi.org/10.1109/access.2018.2805724.
Pełny tekst źródłaYe, Yun, Dalei Wu, Zhihui Shu, and Yi Qian. "Overview of LTE Spectrum Sharing Technologies." IEEE Access 4 (2016): 8105–15. http://dx.doi.org/10.1109/access.2016.2626719.
Pełny tekst źródłaZhou, Zhili, Ching-Nung Yang, Yi Cao, and Xingming Sun. "Secret Image Sharing Based on Encrypted Pixels." IEEE Access 6 (2018): 15021–25. http://dx.doi.org/10.1109/access.2018.2811722.
Pełny tekst źródłaLi, Wen Ming, and Liang Feng Zhang. "Towards Efficient Information-Theoretic Function Secret Sharing." IEEE Access 8 (2020): 28512–23. http://dx.doi.org/10.1109/access.2020.2971722.
Pełny tekst źródłaZhang, Sen, and Weiwei Ni. "Graph Embedding Matrix Sharing With Differential Privacy." IEEE Access 7 (2019): 89390–99. http://dx.doi.org/10.1109/access.2019.2927365.
Pełny tekst źródłaLiu, Wenjie, Yinsong Xu, Maojun Zhang, Junxiu Chen, and Ching-Nung Yang. "A Novel Quantum Visual Secret Sharing Scheme." IEEE Access 7 (2019): 114374–84. http://dx.doi.org/10.1109/access.2019.2931073.
Pełny tekst źródłaDiaz-Sanchez, Daniel, Andres Marin, Florina Almenarez, and Alberto Cortes. "Sharing conditional access modules through the home network for pay TV access." IEEE Transactions on Consumer Electronics 55, no. 1 (February 2009): 88–96. http://dx.doi.org/10.1109/tce.2009.4814419.
Pełny tekst źródłaDyke, Stephanie O. M., Katie M. Saulnier, Tomi Pastinen, Guillaume Bourque, and Yann Joly. "Evolving data access policy: The Canadian context." FACETS 1, no. 1 (March 1, 2017): 138–47. http://dx.doi.org/10.1139/facets-2016-0002.
Pełny tekst źródłaBaich, Tina. "Open access: help or hindrance to resource sharing?" Interlending & Document Supply 43, no. 2 (May 18, 2015): 68–75. http://dx.doi.org/10.1108/ilds-01-2015-0003.
Pełny tekst źródłaBoué, Stéphanie, Michael Byrne, A. Wallace Hayes, Julia Hoeng, and Manuel C. Peitsch. "Embracing Transparency Through Data Sharing." International Journal of Toxicology 37, no. 6 (October 3, 2018): 466–71. http://dx.doi.org/10.1177/1091581818803880.
Pełny tekst źródłaFathimal, P. Mohamed, and P. Arockia Jansi Rani. "Threshold Secret Sharing Scheme for Compartmented Access Structures." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 1–9. http://dx.doi.org/10.4018/ijisp.2016070101.
Pełny tekst źródłaWANG, Xianfang, Fang-Wei FU, and Xuan GUANG. "Probabilistic Secret Sharing Schemes for Multipartite Access Structures." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E99.A, no. 4 (2016): 856–62. http://dx.doi.org/10.1587/transfun.e99.a.856.
Pełny tekst źródłaPatil, Sonali, and Prashant Deshmukh. "General Access Structure Secret Sharing in Matrix Projection." International Journal of Computer Applications 107, no. 13 (December 18, 2014): 6–9. http://dx.doi.org/10.5120/18809-0369.
Pełny tekst źródłaVP, Binu, and Sreekumar A. "Efficient Multi Secret Sharing with Generalized Access Structures." International Journal of Computer Applications 90, no. 12 (March 26, 2014): 1–6. http://dx.doi.org/10.5120/15769-4446.
Pełny tekst źródła