Access method

Results: 835



#Item
101IBM DB2 / CICS / IBM software / Office work / Paper / Data management / Virtual Storage Access Method / Z/OS / Software / Transaction processing / Computing

SoftBase Logo white w Tag

Add to Reading List

Source URL: www.softbase.com

Language: English - Date: 2011-12-05 09:11:15
102Network architecture / Ethernet / OSI protocols / Software / Channel access method / OSI model / Collision / Linux kernel / Carrier sense multiple access with collision detection / Computing / Media Access Control / Computer architecture

ENG224 Information Technology Mid-term Test Date: 27 Oct 2006 Time: 8:40 a.m. – 9:25 a.m. Answer ALL questions (Full mark: 100) Fig. 1 shows a Linux terminal session.

Add to Reading List

Source URL: www.eie.polyu.edu.hk

Language: English - Date: 2006-12-07 02:53:17
103Knowledge / Academic literature / Scientific method / Research / Documents / Peer review / Electronic submission / Open access / Copyright / Academic publishing / Publishing / Academia

© 2003 J Sports Sci & Med

Add to Reading List

Source URL: www.jssm.org

Language: English - Date: 2015-05-08 08:31:50
104Scientific method / Knowledge / Open access / Peer review / Scientific data archiving / Academic publishing / Publishing / Academia

• David Carlson • Hans Pfeiffenberger Additional Information ESSD

Add to Reading List

Source URL: www.earth-system-science-data.net

Language: English - Date: 2014-04-23 19:07:23
105Dd / ISPF / Computing / System software / Virtual Storage Access Method

Chicago Interface Group, Inc. Installation Guide Adhoc Reporter, FastLIST, Greenhouse,

Add to Reading List

Source URL: www.cigi.net

Language: English - Date: 2012-04-09 12:20:12
106Academia / Environmental science / Scientific method / Climatology / Data sharing / Scientific misconduct / Open data / Biodiversity informatics / Open access / Academic publishing / Science / Knowledge

Viewpoint Biodiversity Data Sharing: Will Peer-Reviewed Data Papers Work? Xiaolei Huang, Bradford A. Hawkins, and Gexia Qiao

Add to Reading List

Source URL: www.naturethinker.org

Language: English - Date: 2013-01-11 22:41:09
107Technology / Wireless networking / Media Access Control / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Cognitive radio / Distributed coordination function / Channel access method / Channel / Radio resource management / Telecommunications engineering / OSI protocols

Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasures Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona Email: ,

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2013-03-07 17:47:49
108Knowledge / Academic literature / Scientific method / Peer review / Open access / Academic publishing / Publishing / Academia

Call for Submissions and Author Instructions Leadership is the focus of the next issue of PNLA Quarterly (79.2, SpringWe invite library practitioners, students, and educators in the PNLA region (Alaska, Alberta,

Add to Reading List

Source URL: www.pnla.org

Language: English - Date: 2015-02-06 12:18:18
109Telecommunications engineering / Network architecture / Electronic engineering / OSI protocols / Quality of service / Throughput / Channel access method / Bandwidth management / Adaptive quality of service multi-hop routing / Network performance / Teletraffic / Streaming

ABSTRACT QOS GUARANTEES IN WIRELESS/MOBILE NETWORKS by Sunghyun Choi Chair: Kang G. Shin

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:09
110Enterprise application integration / Microsoft Host Integration Server / Computer architecture / Server / Virtual Telecommunications Access Method / Microsoft Windows / Windows NT / Remote desktop / IBM Systems Network Architecture / Network protocols / Computing / Software

3770 SNA/RJE Emulation for Remote Windows PCs & Clients to Microsoft Host

Add to Reading List

Source URL: serengeti.com

Language: English - Date: 2010-06-01 17:45:10
UPDATE