نتایج جستجو برای: media access control
تعداد نتایج: 1852182 فیلتر نتایج به سال:
BACKGROUND In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. OBJECTIVE The purpose of this study was to provide updated estimates of social media us...
Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of critical skills to navigate and critically assess the information is necessary. This paper outlines the significance of these skills, and prov...
This paper examines the effect of open access policy on competition in network industries under uncertainty. Comparing a competition under an open access policy with a facility-based competition, we confirm that allowing access to an essential facility makes the timing of a follower’s entry earlier than that in a facility-based competition, irrespective of the level of access charge. Furthermor...
Mobile Ad-hoc Network (MANET) is a self configuring infrastructure-less network of mobile devices connected by wireless They have undergone rapid growth in the past several years because of their application in military and rescue service, disaster recovery operations, mobile conferencing and many other applications. The Media Access Control (MAC) data communication protocol sub-layer provides ...
In this paper we are introducing the concept for the unified data access framework. The main aim of our work is to allow the unified data access on the international level for educational, commercial and security purposes. The idea of the unified access is important in the current days mostly for the national/international security, international labor policy, market restrictions or diseases pr...
In this paper we are introducing the concept for the unified data access framework. The main aim of our work is to allow the unified data access on the international level for educational, commercial and security purposes. The idea of the unified access is important in the current days mostly for the national/international security, international labor policy, market restrictions or diseases pr...
The e ectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-speci c. The inherent problem of oor contr...
We present a theory for comparing the expressive power of access control models. The theory is based on simulations that preserve security properties. We perceive access control systems as state-transition systems and present two kinds of simulations, reductions and state-matching reductions. In applying the theory, we highlight four new results and discuss these results in the context of other...
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasing attention. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI). While the mandatory concept of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید