Results 201 to 210 of about 1,234,327 (265)
Anonymization, accountability, and access: legal dimensions of health data sharing in federated networks. Perspectives from empirical study. [PDF]
Kogut-Czarkowska M, Shabani M.
europepmc +1 more source
Air Ambulance Contracting and Reimbursement and the No Surprises Act.
Duffy E, Ly B, Trish E.
europepmc +1 more source
Correction to: Task-based effective connectivity finds alterations in frontoparietal network in Duchenne muscular dystrophy. [PDF]
europepmc +1 more source
The speaker’s lexical-semantic network in the tip of the tongue state
Couvreu M, Laganaro M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Fixed access network technologies
BT Technology Journal, 2004Telecommunications operators around the world are facing flat or declining revenues in their traditional services and expanding commercial and political demand for ubiquitous broadband access. This creates two opposing pressures -- to cut costs radically and to invest heavily in new technology. The traditional fixed access network is central to both of
A F Cameron +3 more
openaire +1 more source
Optical access network technologies for future radio access networks
2017 IEEE Photonics Society Summer Topical Meeting Series (SUM), 2017This paper describes optical access network technologies that support future radio access networks. Packet-based BBU is expected to accommodate multiple services and PON with low-latency scheme is a promising candidate to for MFH transmission in future radio access networks.
Jun Terada +2 more
openaire +1 more source
2021
Network access control is quite a blunt tool, which is not necessarily a bad thing. What this means is that you want to place access controls to your data warehouse based on the network origin of the traffic. This can be a quick and effective way to reduce security risks, as well as sometimes being part of compliance requirements (to have, as well as ...
Ben Herzberg, Yoav Cohen
openaire +2 more sources
Network access control is quite a blunt tool, which is not necessarily a bad thing. What this means is that you want to place access controls to your data warehouse based on the network origin of the traffic. This can be a quick and effective way to reduce security risks, as well as sometimes being part of compliance requirements (to have, as well as ...
Ben Herzberg, Yoav Cohen
openaire +2 more sources
Global Access Network Evolution
IEEE/ACM Transactions on Networking, 2010In this paper, we propose to tackle the problem of updating the access network in order to connect new subscribers and to satisfy the new class of service requirements for the existing subscribers to offer, for instance, new services such as high-definition television (HDTV) over the Internet protocol (IPTV). Four important access network architectures/
openaire +1 more source
2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks), 2014
In this work we present a mathematical optimization model for planning the deployment of fast internet technology in a local exchange area. The locations of the new multi-service access nodes (MSANs) and the connections between these nodes and the main distribution frame (hub) are planned simultaneously.
Marcel T. Kalsch, Katrin Tschirpke
openaire +1 more source
In this work we present a mathematical optimization model for planning the deployment of fast internet technology in a local exchange area. The locations of the new multi-service access nodes (MSANs) and the connections between these nodes and the main distribution frame (hub) are planned simultaneously.
Marcel T. Kalsch, Katrin Tschirpke
openaire +1 more source

