Showing 261 - 280 results of 15,110 for search '"accessibility"', query time: 0.06s Refine Results
  1. 261

    LOCAL BARLEY ACCESSIONS FROM ETHIOPIA RESISTANT TO POWDERY MILDEW by N. V. Alpatieva, R. A. Abdullaev, I. N. Anisimova, N. K. Gubareva, O. N. Kovaleva, E. E. Radchenko

    Published 2018-06-01
    “…Three accessions (k-8555, k-8682 k-17554) were heterogeneous by the studied trait. …”
    Get full text
    Article
  2. 262
  3. 263

    Opportunistic spectrum access algorithm based on cross-layer optimization by ZHANG Jing, ZHU Hong-bo

    Published 2010-01-01
    Subjects: “…opportunistic spectrum access…”
    Get full text
    Article
  4. 264

    Design of Interference-Resilient Medium Access for High Throughput WLANs by Luca Reggiani, Andrea Gola, Gian Mario Maggio, Gianluigi Tiberi

    Published 2015-10-01
    “…In this paper, we analyze a protocol strategy for managing multiple access in wireless networks. A network of sensors colocated with the WLAN terminals forms a control layer for managing the medium access and scheduling resources in order to limit collisions and optimize the WLAN data traffic; this control layer is based on a low-power wideband technology characterized by interference robustness, like CDMA (code division multiple access) or UWB (ultra-wideband) for sensors. …”
    Get full text
    Article
  5. 265
  6. 266

    Legal Guerilla: Jurisdiction, Time, and Abortion Access in Mexico City by Amy Krauss

    Published 2021-12-01
    “…In closing, she argues that feminist activists who work to create access and people who seek abortion enact their own forms of “legal guerilla” as they move through these overlapping and contradictory legalities.…”
    Get full text
    Article
  7. 267
  8. 268
  9. 269
  10. 270

    An Application of Improved Gap-BIDE Algorithm for Discovering Access Patterns by Xiuming Yu, Meijing Li, Taewook Kim, Seon-phil Jeong, Keun Ho Ryu

    Published 2012-01-01
    “…Discovering access patterns from web log data is a typical sequential pattern mining application, and a lot of access pattern mining algorithms have been proposed. …”
    Get full text
    Article
  11. 271

    ACCESSING FINANCE FOR INNOVATIVE EU SMES – KEY DRIVERS AND CHALLENGES by Laura Vasilescu

    Published 2014-11-01
    “…However, SMEs can fulfill this potential if they obtain the finance necessary to start and develop their businesses. Access to finance is a key determinant for business start-up, development and growth for SMEs, including the innovative ones, and they have different needs and face different challenges. …”
    Get full text
    Article
  12. 272
  13. 273
  14. 274

    Customizing GPT for natural language dialogue interface in database access by Jin-Dong Kim, Kousaku Okubo

    Published 2024-11-01
    “…It illustrates the significant potential of large language models (LLMs) as user-friendly interfaces for database access. Furthermore, it showcases the seamless integration of LLMs and database APIs, within the GPTS framework, offering a promising and straightforward approach.…”
    Get full text
    Article
  15. 275

    GREENBUG RESISTANCE IN OAT ACCESSIONS FROM DAGESTAN AND CAUCASIAN COUNTRIES by E. E. Radchenko, M. A. Chumakov, I. G. Loskutov

    Published 2019-10-01
    “…They are followed by accessions from Georgia (25%), Armenia (17.3%) and Dagestan (13.8%). …”
    Get full text
    Article
  16. 276
  17. 277

    Improving Access in Gastroenterology: The Single Point of Entry Model for Referrals by Kerri L Novak, Sander Veldhuyzen Van Zanten, Sachin R Pendharkar

    Published 2013-01-01
    “…There are many benefits of SEMs including improved access and reduced wait times. Understanding and measuring complex patient flow systems is key to improving access, and centralized intake systems provide an opportunity to better understand total demand and system bottlenecks. …”
    Get full text
    Article
  18. 278
  19. 279

    The Visibility of Scholarly Knowledge: Awareness for Open Access in Hacettepe University by Korhan Levent Ertürk, Mehmet Emin Küçük

    Published 2013-11-01
    “…The scholars begin to place their works into the open repositories or open access journals as well as their personal web sites. …”
    Get full text
    Article
  20. 280

    Study on the Security Access Technology of Business Platform Communication Network by 陈捷

    Published 2014-04-01
    “…Combined with the features of telecom operator communications network, the security access technology from business platform to signaling network was discussed, and the key technology about business platform accessing security gateway was elaborated. …”
    Get full text
    Article