Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Electronic data processing departments.

Rozprawy doktorskie na temat „Electronic data processing departments”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Electronic data processing departments”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Baxter, David. "Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /." Swinburne Research Bank, 2004. http://hdl.handle.net/1959.3/46062.

Pełny tekst źródła
Streszczenie:
Thesis (D.B.A.)--Swinburne University of Technology, Australian Graduate School of Entrepreneurship, 2004.<br>A thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
Style APA, Harvard, Vancouver, ISO itp.
2

Javanshir, Marjan. "DC distribution system for data center." Thesis, Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39344952.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Miles, Shaun Graeme. "An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006653.

Pełny tekst źródła
Streszczenie:
This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Management, with a focus on open environments. Through literature research the issues of privacy, anonymity and access control are identified. The issue of privacy is an inherent problem due to the nature of the digital network environment. Information can be duplicated and modified regardless of the wishes and intentions ofthe owner of that information unless proper measures are taken to secure the environment. Once information is published or divulged on the network, there is very little way of
Style APA, Harvard, Vancouver, ISO itp.
4

Giesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Goss, Ryan Gavin. "Enabling e-learning 2.0 in information security education: a semantic web approach." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/909.

Pełny tekst źródła
Streszczenie:
The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
Style APA, Harvard, Vancouver, ISO itp.
6

Perelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.

Pełny tekst źródła
Streszczenie:
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever-increasing workload in terms of security administration. Security administration encompasses the activity of ensuring the correct enforcement of access control within an organisation. Access rights and their allocation are dictated by the security policies within an organisation. As such, security administration can be seen as a policybased approach. Policy-based approaches promise to lighten the workload of security
Style APA, Harvard, Vancouver, ISO itp.
7

Smith, Michael Alan. "An empirical investigation of the determinants of information systems outsourcing." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/29455.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Lam, Cheuk-yung. "A case study of IT outsourcing in Hong Kong government /." Hong Kong : University of Hong Kong, 1995. http://sunzi.lib.hku.hk/hkuto/record.jsp?B14039023.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bullock, Kenneth F. "Navy Marine Corps Intranet : an analysis of its approach to the challenges associated with seat management contracting." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBullock.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Pełny tekst źródła
Streszczenie:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that
Style APA, Harvard, Vancouver, ISO itp.
11

Beavan, Robert Benjamin. "Leadership in local government computer service organizations within the state of California." CSUSB ScholarWorks, 1993. https://scholarworks.lib.csusb.edu/etd-project/654.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Chan, Yuk-wah Eliza, and 陳玉華. "A review of catastrophe planning for management information systems inHong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1989. http://hub.hku.hk/bib/B3126427X.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Gerber, Mariana. "The development of a technique to establish the security requirements of an organization." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/89.

Pełny tekst źródła
Streszczenie:
To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization
Style APA, Harvard, Vancouver, ISO itp.
14

Tansley, Natalie Vanessa. "A methodology for measuring and monitoring IT risk." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/772.

Pełny tekst źródła
Streszczenie:
The primary objective of the research is to develop a methodology for monitoring and measuring IT risks, strictly focusing on internal controls. The research delivers a methodology whereby an organization can measure its system of internal controls, providing assurance that the risks are at an acceptable level. To achieve the primary objective a number of secondary objectives were addressed: What are the drivers forcing organizations to better corporate governance in managing risk? What is IT risk management, specifically focusing on operational risk. What is internal control and specifically
Style APA, Harvard, Vancouver, ISO itp.
15

Burdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.

Pełny tekst źródła
Streszczenie:
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Secur
Style APA, Harvard, Vancouver, ISO itp.
16

Beckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Chance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Lee, Kum-Yu Enid. "Privacy and security of an intelligent office form." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9930.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Moller, Alison. "Strategies for sourcing IT skills for South African tertiary institutions." Thesis, Port Elizabeth Technikon, 2004. http://hdl.handle.net/10948/263.

Pełny tekst źródła
Streszczenie:
Traditional methods of IT recruitment in tertiary institutions need to be reviewed and more modern approaches analysed. A lot of successes and failures have been reported for each type of sourcing strategy in the IT sector. Many organizations have been liquidated due to poorly planned mergers, takeovers, and total outsourcing strategic shifts. The primary objective is to review the current IT sourcing strategies in tertiary institutions and to analyse and discuss the benefits and limitations of employing permanent IT staff, contract workers or outsourced staff.
Style APA, Harvard, Vancouver, ISO itp.
20

Lam, Cheuk-yung, and 林卓蓉. "A case study of IT outsourcing in Hong Kong government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1995. http://hub.hku.hk/bib/B31266575.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Bohnstedt, Jan. "Fernwartung : die rechtlichen Grenzen des IT-Outsourcing durch Banken /." Baden-Baden : Nomos, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014614364&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Shoeib, Ashraf. "Key Decision-making Phases And Tasks For Outsourcing Information Technology." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2000. https://ro.ecu.edu.au/theses/1537.

Pełny tekst źródła
Streszczenie:
Outsourcing has become an attractive option for today's organisation. Since outsourcing Information Technology (IT) is a relatively new phenomenon in Australia, little research has been conducted as to IT management strategies needed when considering outsourcing. To guide management in the decision whether or not to outsource IT, the study developed and tested a decision-making model comprising the phases of intelligence, analysis and planning, strategy selection, action, and evaluation and monitoring. The significance of decision phases and tasks contained in the model was established through
Style APA, Harvard, Vancouver, ISO itp.
23

Battikh, Dalia. "Sécurité de l’information par stéganographie basée sur les séquences chaotiques." Thesis, Rennes, INSA, 2015. http://www.theses.fr/2015ISAR0013/document.

Pełny tekst źródła
Streszczenie:
La stéganographie est l’art de la dissimulation de l’information secrète dans un médium donné (cover) de sorte que le médium résultant (stégo) soit quasiment identique au médium cover. De nos jours, avec la mondialisation des échanges (Internet, messagerie et commerce électronique), s’appuyant sur des médiums divers (son, image, vidéo), la stéganographie moderne a pris de l’ampleur. Dans ce manuscrit, nous avons étudié les méthodes de stéganographie LSB adaptatives, dans les domaines spatial et fréquentiel (DCT, et DWT), permettant de cacher le maximum d’information utile dans une image cover,
Style APA, Harvard, Vancouver, ISO itp.
24

Achieng, Mourine Sarah. "The adoption and challenges of electronic voting technologies within the South African context." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1366.

Pełny tekst źródła
Streszczenie:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: in Information Technology in the Faculty of Informatics and Design at the Cape Peninsula University of Technology Supervisor: Dr Ephias Ruhode Cape Town campus December 2013<br>The use of ICTs such as computers, electronic databases and other technologies have been in use for a number of years within the public sector to organise, manage and disseminate information to the public as well as to facilitate day-to-day communication in government offices. In this context, the value of the use of ICTs has been to
Style APA, Harvard, Vancouver, ISO itp.
25

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Chinpanich, Vorapong. "Helpdesk Support Alert System." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2674.

Pełny tekst źródła
Streszczenie:
The goal of this project was to implement the Helpdesk Support Alert System in the Data Center Services (DCS) of California State University, San Bernardino's (CSUSB's) Information Resource and Technology Division (IRT). DCS is responsible for ensuring uninterrupted operation of all CSUSB administrative computing systems. These responsibilities include user support, system maintenance, and system security. The DCS helpdesk cannot be staffed 24 hours a day; this application is designed to alert DCS technicians of emergencies when they are away from the helpdesk. The Helpdesk Support Alert Syste
Style APA, Harvard, Vancouver, ISO itp.
27

Funk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.

Pełny tekst źródła
Streszczenie:
Thesis (LLM)--Stellenbosch University, 2004<br>ENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global commun
Style APA, Harvard, Vancouver, ISO itp.
28

Ostroumov, Ivan Victorovich. "Magnetic field data processing with personal electronic device." Thesis, Polit. Challenges of science today: International Scientific and Practical Conference of Young Researchers and Students, April 6–8, 2016 : theses. – К., 2016. – 83p, 2016. http://er.nau.edu.ua/handle/NAU/26649.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Romig, Phillip R. "Parallel task processing of very large datasets." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/romigab.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Rehfuss, Paul Stephen. "Parallelism in contextual processing /." Full text open access at:, 1999. http://content.ohsu.edu/u?/etd,272.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Robinson, Patrick Glen. "Distributed Linda : design, development, and characterization of the data subsystem /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07102009-040417/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Parker, Greg. "Robust processing of diffusion weighted image data." Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/61622/.

Pełny tekst źródła
Streszczenie:
The work presented in this thesis comprises a proposed robust diffusion weighted magnetic resonance imaging (DW-MRI) pipeline, each chapter detailing a step designed to ultimately transform raw DW-MRI data into segmented bundles of coherent fibre ready for more complex analysis or manipulation. In addition to this pipeline we will also demonstrate, where appropriate, ways in which each step could be optimized for the maxillofacial region, setting the groundwork for a wider maxillofacial modelling project intended to aid surgical planning. Our contribution begins with RESDORE, an algorithm desi
Style APA, Harvard, Vancouver, ISO itp.
33

Tucker, Peter A. "Punctuated data streams /." Full text open access at:, 2005. http://content.ohsu.edu/u?/etd,255.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Gottemukkala, Vibby. "Scalability issues in distributed and parallel databases." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8176.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Lee, J. J. "The object-oriented database and processing of electronic warfare data." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA303112.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Bodorik, Peter Carleton University Dissertation Engineering Electrical. "Query processing strategies in a distributed data base." Ottawa, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Sokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.

Pełny tekst źródła
Streszczenie:
De nos jours, les smartphones et les tablettes génèrent, reçoivent, mémorisent et transfèrent vers des serveurs une grande quantité de données en proposant des services aux utilisateurs via des applications mobiles facilement téléchargeables et installables. Le grand nombre de capteurs intégrés dans un smartphone lui permet de collecter de façon continue des informations très précise sur l'utilisateur et son environnement. Cette importante quantité de données privées et professionnelles devient difficile à superviser.L'approche «Privacy by Design», qui inclut sept principes, propose d'intégrer
Style APA, Harvard, Vancouver, ISO itp.
38

Lewis, Tony. "Electronic data interchange in the construction industry." Thesis, Loughborough University, 1998. https://dspace.lboro.ac.uk/2134/11183.

Pełny tekst źródła
Streszczenie:
The aim of this research is to improve the efficiency of the construction process through the application of electronic data interchange (EDI). This thesis describes the development and application of EDI messages. The messages described are targeted to provide a means for transferring construction specific information during the construction process. The definition of electronic data interchange and its technical issues are first described. The nature of EDI, replacing paper based communication with electronic messages, impacts on the way in which business is conducted, and also has far reach
Style APA, Harvard, Vancouver, ISO itp.
39

Chen, George C. M. "Strategic analysis of a data processing company /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/3624.

Pełny tekst źródła
Streszczenie:
Research Project (M.B.A.) - Simon Fraser University, 2005.<br>Research Project (Faculty of Business Administration) / Simon Fraser University. Senior supervisor : Dr. Ed Bukszar. EMBA Program. Also issued in digital format and available on the World Wide Web.
Style APA, Harvard, Vancouver, ISO itp.
40

Thomas, Muffy. "The imperative implementation of algebraic data types." Thesis, University of St Andrews, 1988. http://hdl.handle.net/10023/13471.

Pełny tekst źródła
Streszczenie:
The synthesis of imperative programs for hierarchical, algebraically specified abstract data types is investigated. Two aspects of the synthesis are considered: the choice of data structures for efficient implementation, and the synthesis of linked implementations for the class of ADTs which insert and access data without explicit key. The methodology is based on an analysis of the algebraic semantics of the ADT. Operators are partitioned according to the behaviour of their corresponding operations in the initial algebra. A family of relations, the storage relations of an ADT, Is defined. They
Style APA, Harvard, Vancouver, ISO itp.
41

Bostanudin, Nurul Jihan Farhah. "Computational methods for processing ground penetrating radar data." Thesis, University of Portsmouth, 2013. https://researchportal.port.ac.uk/portal/en/theses/computational-methods-for-processing-ground-penetrating-radar-data(d519f94f-04eb-42af-a504-a4c4275d51ae).html.

Pełny tekst źródła
Streszczenie:
The aim of this work was to investigate signal processing and analysis techniques for Ground Penetrating Radar (GPR) and its use in civil engineering and construction industry. GPR is the general term applied to techniques which employ radio waves, typically in the Mega Hertz and Giga Hertz range, to map structures and features buried in the ground or in manmade structures. GPR measurements can suffer from large amount of noise. This is primarily caused by interference from other radio-wave-emitting devices (e.g., cell phones, radios, etc.) that are present in the surrounding area of the GPR s
Style APA, Harvard, Vancouver, ISO itp.
42

Cline, George E. "A control framework for distributed (parallel) processing environments." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-12042009-020227/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Clayton, Peter Graham. "Interrupt-generating active data objects." Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1006700.

Pełny tekst źródła
Streszczenie:
An investigation is presented into an interrupt-generating object model which is designed to reduce the effort of programming distributed memory multicomputer networks. The object model is aimed at the natural modelling of problem domains in which a number of concurrent entities interrupt one another as they lay claim to shared resources. The proposed computational model provides for the safe encapsulation of shared data, and incorporates inherent arbitration for simultaneous access to the data. It supplies a predicate triggering mechanism for use in conditional synchronization and as an alter
Style APA, Harvard, Vancouver, ISO itp.
44

Jin, Xiaoming. "A practical realization of parallel disks for a distributed parallel computing system." [Gainesville, Fla.] : University of Florida, 2000. http://etd.fcla.edu/etd/uf/2000/ane5954/master.PDF.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Florida, 2000.<br>Title from first page of PDF file. Document formatted into pages; contains ix, 41 p.; also contains graphics. Vita. Includes bibliographical references (p. 39-40).
Style APA, Harvard, Vancouver, ISO itp.
45

Nader, Babak. "Parallel solution of sparse linear systems." Full text open access at:, 1987. http://content.ohsu.edu/u?/etd,138.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Khare, Arjun. "ACT++ 3.0 : implementation of the actor model using POSIX threads /." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020041/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Wan, Charn Wing. "The political economy of digital copyright in Hong Kong /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?jsd-slw-b23750893f.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (JSD)--City University of Hong Kong, 2009.<br>"Submitted to School of Law in partial fulfillment of the requirements for the degree of Doctor of Juridical Science." Includes bibliographical references (leaves 435-452)
Style APA, Harvard, Vancouver, ISO itp.
48

Gardener, Michael Edwin. "A multichannel, general-purpose data logger." Thesis, Cape Technikon, 1986. http://hdl.handle.net/20.500.11838/2179.

Pełny tekst źródła
Streszczenie:
Thesis (Diploma (Electrical Engineering))--Cape Technikon, 1986.<br>This thesis describes the implementation of a general-purpose, microprocessor-based Data Logger. The Hardware allows analog data acquisition from one to thirty two channels with 12 bit resolution and at a data throughput of up to 2KHz. The data is logged directly to a Buffer memory and from there, at the end of each 109, it is dumped to an integral cassette data recorder. The recorded data can be transfered from the logger to a desk-top computer, via the IEEE 488 port, for further processing and display. All log parame
Style APA, Harvard, Vancouver, ISO itp.
49

Fowler, Robert Joseph. "Decentralized object finding using forwarding address /." Thesis, Connect to this title online; UW restricted, 1985. http://hdl.handle.net/1773/6947.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Pu, Calton. "Replication and nested transactions in the Eden Distributed System /." Thesis, Connect to this title online; UW restricted, 1986. http://hdl.handle.net/1773/6881.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!