Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Experience-Based Access Control in UbiComp: A New Paradigm
(Articles)
Nalini A. Mhetre
,
Arvind V. Deshpande
,
Parikshit N. Mahalle
Journal of Computer and Communications
Vol.10 No.1
,January 30, 2022
DOI:
10.4236/jcc.2022.101007
199
Downloads
845
Views
Citations
A New Technique for Attention Management and Somatosensory Processing in Hypnotherapy: Mental Access/Somatosensory Access (MASSA)
(Articles)
Eitan G. Abramowitz
Open Journal of Medical Psychology
Vol.12 No.4
,October 9, 2023
DOI:
10.4236/ojmp.2023.124012
64
Downloads
409
Views
Citations
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
(Articles)
Sampath Talluri
Journal of Information Security
Vol.15 No.1
,December 25, 2023
DOI:
10.4236/jis.2024.151001
71
Downloads
335
Views
Citations
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
(Articles)
Sampath Talluri
Journal of Information Security
Vol.15 No.1
,January 22, 2024
DOI:
10.4236/jis.2024.151004
62
Downloads
231
Views
Citations
Book Review of Green Materials for Sustainable Water Remediation and Treatment
(Articles)
Nour-Eddine Es-Safi
Green and Sustainable Chemistry
Vol.4 No.3
,August 21, 2014
DOI:
10.4236/gsc.2014.43022
3,610
Downloads
4,783
Views
Citations
Irish Water and Scottish Water: A Comparison
(Articles)
Rodney McDermott
,
Brian Solan
,
Sarah McCord
,
Kim Littlewood
Journal of Water Resource and Protection
Vol.11 No.8
,August 30, 2019
DOI:
10.4236/jwarp.2019.118063
1,285
Downloads
3,780
Views
Citations
Hardware/Compiler Memory Protection in Sensor Nodes
(Articles)
Lanfranco LOPRIORE
Int'l J. of Communications, Network and System Sciences
Vol.1 No.3
,October 9, 2008
DOI:
10.4236/ijcns.2008.13028
6,206
Downloads
10,293
Views
Citations
Access Control for Manufacturing Process in Networked Manufacturing Environment
(Articles)
Ke Zhou
,
Min Lv
,
Gang Wang
,
Bingyin Ren
Journal of Service Science and Management
Vol.2 No.2
,June 17, 2009
DOI:
10.4236/jssm.2009.22014
5,352
Downloads
9,598
Views
Citations
Performance Analysis of MAC Protocol for LEO Satellite Networks
(Articles)
Mingxiang GUAN
,
Ruichun WANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.8
,November 17, 2009
DOI:
10.4236/ijcns.2009.28091
5,331
Downloads
9,290
Views
Citations
Self-Organized Detection of Relationships in a Network
(Articles)
Qurban A. Memon
Int'l J. of Communications, Network and System Sciences
Vol.3 No.3
,March 31, 2010
DOI:
10.4236/ijcns.2010.33039
3,771
Downloads
7,590
Views
Citations
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
(Articles)
Zheng Teng
,
Ki-Il Kim
Communications and Network
Vol.2 No.2
,May 31, 2010
DOI:
10.4236/cn.2010.22017
10,676
Downloads
22,442
Views
Citations
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
(Articles)
Yan Wang
,
Hongli Liu
,
Jun Feng
Circuits and Systems
Vol.1 No.1
,July 28, 2010
DOI:
10.4236/cs.2010.11005
10,648
Downloads
20,579
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,781
Downloads
9,488
Views
Citations
Contribution of Rural Roads to Access to- and Participation in Markets: Theory and Results from Northern Ethiopia
(Articles)
Torbjørn Årethun
,
Bharat P. Bhatta
Journal of Transportation Technologies
Vol.2 No.2
,April 23, 2012
DOI:
10.4236/jtts.2012.22018
5,897
Downloads
10,864
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44017
8,947
Downloads
16,165
Views
Citations
Evaluation of Different Electronic Product Code Discovery Service Models
(Articles)
Su Mon Kywe
,
Jie Shi
,
Yingjiu Li
,
Raghuwanshi Kailash
Advances in Internet of Things
Vol.2 No.2
,April 24, 2012
DOI:
10.4236/ait.2012.22005
6,347
Downloads
14,164
Views
Citations
Performance Analysis of Unified Failure Model for Emerging WiMAX Networks
(Articles)
Rajesh Anbazhagan
,
Nakkeeran Rangaswamy
Wireless Engineering and Technology
Vol.3 No.2
,April 28, 2012
DOI:
10.4236/wet.2012.32011
6,104
Downloads
9,539
Views
Citations
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models
(Articles)
Alfredo Maesa
,
Fabio Garzia
,
Michele Scarpiniti
,
Roberto Cusani
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34041
7,495
Downloads
15,110
Views
Citations
Family caregivers of demented elderly people and access to medical care: Who gets worn out, why and what for?
(Articles)
Cyril Hazif-Thomas
,
Marie-Hélène Tritschler-LeMaître
,
Philippe Thomas
Open Journal of Psychiatry
Vol.3 No.2
,April 15, 2013
DOI:
10.4236/ojpsych.2013.32023
3,903
Downloads
6,029
Views
Citations
RSSI-based Algorithm for Indoor Localization
(Articles)
Xiuyan Zhu
,
Yuan Feng
Communications and Network
Vol.5 No.2B
,July 10, 2013
DOI:
10.4236/cn.2013.52B007
8,406
Downloads
17,045
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top