„access control“
Suchergebnisse
1.000+ Treffer
-
Secure access control for manufacturing sector with application of ethereum blockchain
-
A trust-based collaborative access control model with policy aggregation for online social networks
-
Access the cluster tendency by visual methods for robust speech clustering
-
Uplink access control for machine-type communications in LTE-A networks
-
Access to a polymerase chain reaction assay method targeting 13 respiratory viruses can reduce antibiotics: a randomised, controlled trial
-
Thresholds in the process of international financial integration
-
A new approach to ranking attributes in attribute based access control using decision fusion
-
Accessing groundwater quality in lower part of Nagapattinam district, Southern India: using hydrogeochemistry and GIS interpolation techniques
-
Influence of tea saponin on enhancing accessibility of pyrene and cadmium phytoremediated with Lolium multiflorum in co-contaminated soils
-
The effect of expanded access to mental health care on economic status of households with a person with a mental disorder in rural Ethiopia: a controlled before-after study
-
Cover Feature: Copper (I)‐Catalyzed Acid‐Controlled Divergent Radical Cyclization of 1,6‐Enynes to Access 1‐Indanones and 1H‐Cyclopropa (b) Naphthalene‐2,7‐diones
-
Outside Front Cover: Catalyst Improved Stereoselectivity and Regioselectivity Control to Access Completely Alternating Poly (lactic‐co‐glycolic acid) with Enhanced Properties
-
Outside Front Cover: Catalyst Improved Stereoselectivity and Regioselectivity Control to Access Completely Alternating Poly (lactic‐co‐glycolic acid) with Enhanced Properties
-
Controllable Access to Furans and Dihydrofurans through Cyclization/Coupling of Internal Acetylenic β‐Ketoesters with Aryl Bromides.
-
Back Cover: Tailored Synthesis of 162‐Residue S ‐Monoglycosylated GM2‐Activator Protein (GM2AP) Analogues that Allows Facile Access to a Protein Library (ChemBioChem 20/2016)
-
Miteinander.Stadt.Machen. – zukunftsfähige Kommunalentwicklung - Strategien und Instrumente, die funktionieren und begeistern
-
Future Challenges in Security and Privacy for Academia and Industry – 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings
-
Fingerprint-based access to personally controlled health records in emergency situations
-
Protocole of a controlled before-after evaluation of a national health information technology-based program to improve healthcare coordination and access to information
-
Ghana’s Ensure Mothers and Babies Regular Access to Care (EMBRACE) program: study protocol for a cluster randomized controlled trial