Access method

Results: 835



#Item
781Information retrieval / Error detection and correction / Information / Hash table / Hash function / Trie / Extendible hashing / Cryptographic hash function / B-tree / Information science / Search algorithms / Hashing

Extendible Hashing-A Fast Access Method for Dynamic Files

Add to Reading List

Source URL: www.informatik.uni-jena.de

Language: English - Date: 2005-11-08 01:51:24
782Software-defined radio / Multi-carrier code division multiple access / Broadcast engineering / Subcarrier / IEEE 802.11a-1999 / Orthogonal frequency-division multiple access / IEEE 802.11 / Modulation / Electronic engineering / Multiplexing / OSI protocols / Orthogonal frequency-division multiplexing

K.T. Wong, B. Wang and J.-C. Chen This proposed method reduces the peak-to-average power ratio (PAPR) of multi-carrier transmission, by exploiting null subcarriers, already

Add to Reading List

Source URL: www.eie.polyu.edu.hk

Language: English - Date: 2011-01-08 10:33:35
783Java enterprise platform / Virtual Telecommunications Access Method / Z/OS / Internet protocol suite / IBM Advanced Peer-to-Peer Networking / OS/390 / HiperSocket / MVS / IBM WebSphere / Computing / Network protocols / Software

ABCs of z/OS System Programming Volume 4

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2011-02-10 01:00:20
784Knowledge / Academic literature / Research / Library science / Peer review / Scientific method / Manuscript / Electronic submission / Open access / Academic publishing / Publishing / Academia

Chemistry Letters, The Chemical Society of Japan Information for Authors

Add to Reading List

Source URL: www.csj.jp

Language: English - Date: 2013-09-27 08:52:14
785Technology / Media Access Control / Wireless sensor network / Channel access method / ANT / Hidden node problem / Link layer / Carrier sense multiple access with collision avoidance / Wireless ad-hoc network / Wireless networking / Computing / OSI protocols

1 MAC Protocols for Wireless Sensor Networks:

Add to Reading List

Source URL: www.cmpe.boun.edu.tr

Language: English - Date: 2005-03-08 12:41:23
786Non-classical logic / Probability theory / Subjective logic / XACML / Authorization / Delegation / Simple public key infrastructure / Information security / Information / Security / Computing / Computer security

A Method for Access Authorisation Through Delegation Networks Audun Jøsang1 1

Add to Reading List

Source URL: persons.unik.no

Language: English - Date: 2008-04-28 03:37:53
787Observatory / Astronomical seeing / Astronomy / Scientific method / Observation / Ahal Province / Dushak / Observational astronomy

This article was downloaded by:[Bochkarev, N.] On: 20 December 2007 Access Details: [subscription number[removed]]

Add to Reading List

Source URL: images.astronet.ru

Language: English - Date: 2008-09-28 05:23:54
788Computer architecture / Virtual Telecommunications Access Method / IBM Systems Network Architecture / IBM Advanced Peer-to-Peer Networking / Data-Link Switching / Internet protocol suite / Z/OS / Link layer / Gateway / Network protocols / Network architecture / Computing

Introduction to the New Mainframe: Networking

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2009-09-24 08:59:44
789Linux on System z / VSE / Z/OS / Virtual LAN / VM / Virtual Telecommunications Access Method / Internet protocol suite / IBM System z / MVS / System software / Software / HiperSocket

HiperSockets Implementation Guide

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2007-03-28 15:51:21
790Computing / Avionics / Aircraft instruments / ARINC / Open Travel Alliance / Channel access method / Terminal emulator / Terminal / Communications protocol / Standards / Technology / Aviation

TIMING ANALYSIS OF THE ARINC 629 DATABUS FOR REAL-TIME APPLICATIONS Dr. N. C. Audsley & A. Grigg :

Add to Reading List

Source URL: beru.univ-brest.fr

Language: English - Date: 2013-06-13 12:29:50
UPDATE