Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("ADMISSION UTILISATEUR")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 66

  • Page / 3

Export

Selection :

  • and

FOUR NEW WAYS TO SERVE NONRESIDENTS WITHOUT LOSSESKIRWIN FM.1979; LIBRARY J.; USA; DA. 1979; VOL. 104; NO 6; PP. 684-685Article

PROJEKTOVA ULOHA SUDSYSTEMU EVIDENCE CTENARU. = PROJET RELATIF AU ROLE DU SOUS-SYSTEME POUR L'INSCRIPTION DES LECTEURSHODAC H.1975; PRAGUE; COSTEI; DA. 1975; PP. (27P.); MICROCOPIEMiscellaneous

LIBRARY ACCESS FOR STUDENTS IN NONTRADITIONAL DEGREE PROGRAMSNOLAN M.1975; DREXEL LIBRARY QUART.; U.S.A.; DA. 1975; VOL. 11; NO 2; PP. 16-33; BIBL. 21 REF.Article

AMENDMENT TO REGULATIONS OF THE COMMISSIONER OF EDUCATION GOVERNING THE USE OF THE NEW YORK STATE LIBRARY1975; BOOKMARK.; U.S.A.; DA. 1975; VOL. 34; NO 4; PP. 105-108Article

Discriminating between readers: the case for a policy of flexibilityMORTIMER, Ian.Journal of the Society of Archivists. 2002, Vol 23, Num 1, pp 59-67, issn 0037-9816Article

Admissions monitoring system for Newcastle University LibraryMORROW, J.VINE. Very informal newsletter on library automation. 1986, Num 62, pp 48-50, issn 0305-5728Article

Authentication and library public access computers: A call for discussionCOURTNEY, Nancy.College & research libraries news. 2004, Vol 65, Num 5, pp 269-270, issn 0099-0086, 2 p., 277 [3 p.]Article

A study for control of client value using cluster analysisPARK, Hea-Sook; BAIK, Doo-Kwon.Journal of network and computer applications. 2006, Vol 29, Num 4, pp 262-276, issn 1084-8045, 15 p.Article

An overview of British Library automation at St. PancrasBUTCHER, R.Program (London. 1966). 1993, Vol 27, Num 3, pp 281-292, issn 0033-0337Article

Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamicsKOTANI, K; HORII, K.Behaviour & information technology (Print). 2005, Vol 24, Num 4, pp 289-302, issn 0144-929X, 14 p.Article

Data security and authentication in digital librariesKRISHNA KUMAR, C; GOPALAN, Poofa.Digital information exchange. Annual conference. 2004, pp 400-404, 1Vol, 5 p.Conference Paper

L'action culturelle aux archives = Cultural activities in archivesGAUTIER-DESVAUX, E.Gazette des archives. 1988, Num 141, pp 218-236, issn 0016-5522Article

Authentication and Access: Accommodating Public Users in an Academic WorldWEBER, Lynne; LAWRENCE, Peg.Information technology and libraries. 2010, Vol 29, Num 3, pp 128-140, issn 0730-9295, 13 p.Article

Social Construction of Authorized Users in the Digital AgeXIAOHUA ZHU; ESCHENFELDER, Kristin R.College & research libraries. 2010, Vol 71, Num 6, pp 548-568, issn 0010-0870, 21 p.Article

Nonaffiliated Users in Academic Libraries: Using W.D. Ross's Ethical Pluralism to Make Sense of the Tough QuestionsLENKER, Mark; KOCEVAR-WEIDINGER, Elizabeth.College & research libraries. 2010, Vol 71, Num 5, pp 421-434, issn 0010-0870, 14 p.Article

Utilidades del certificado digital Izenpe en las bibliotecas pùblicas de Euskadi = Izenpe digital signature utilities in public libraries of the Basque countryPULGAR VERNALTE, Francisca; MARCOS MACIA, Sonia.El Profesional de la información. 2006, Vol 15, Num 4, pp 307-309, issn 1386-6710, 3 p.Article

Data security control of digitized library : A viewPUSPANJALI, Jena.Digital information exchange. Annual conference. 2004, pp 384-394, 1Vol, 11 p.Conference Paper

Shibboleth and SAML: At last, a viable global standard for resource access managementPASCHOUD, John.New review of information networking. 2004, Vol 10, Num 2, pp 147-160, issn 1361-4576, 14 p.Article

An effective admission control mechanism for variable-bit-rate video streamsKYUNGOH LEE; YEOM, H. Y.Multimedia systems. 1999, Vol 7, Num 4, pp 305-311, issn 0942-4962Article

Probability of inadmissible estimates of heritability from full-Sib analysis under a general model of gene actionPRABHAKARAN, V. T; JAIN, J. P.Biometrical journal. 1988, Vol 30, Num 1, pp 47-57, issn 0323-3847Article

Access without authentication : How and why we let anyone surf our wirelessWATKINS, Donna.Computers in libraries. 2006, Vol 26, Num 3, issn 1041-7915, 10-14, 50 [6 p.]Article

Students beat the queue and produce their own library cardsLOCKTON, Laurence.Computers in libraries. 2006, Vol 26, Num 6, issn 1041-7915, 3, 10-12, 50-52 [7 p.]Article

Anything, anytime, anywhere: Proxy servers, shibboleth, and the dream of the digital libraryMIKESELL, Brian L.Journal of library administration. 2004, Vol 41, Num 1-2, pp 315-326, issn 0193-0826, 12 p.Conference Paper

El mostrador de admisión. Diseño del mostrador para las âreas de admisión en la Unidad de Atención al Cliente (UAC) = The admission desk. Desk design for the Departments of Customer ServiceBLANQUER GREGORI, J. J; GALLEGOS, A. Alonso; LARNIA SANCHEZ, A et al.Medifam (Madrid). 2003, Vol 13, Num 2, pp 98-106, issn 1131-5768, 9 p.Article

Un système d'authentification avancé basé sur la technique OTP = An advanced authentification system based on the OTP conceptNOUALI-TABOUDJEMAT, Nadia; BENZAID, Mounir; MIHOUBI, Bachir et al.RIST. 2000, Vol 10, Num 1-2, issn 1111-0015, 3, 8, 13-25 [14 p.]Article

  • Page / 3