Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("USER ADMISSION")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 48

  • Page / 2
Export

Selection :

  • and

FOUR NEW WAYS TO SERVE NONRESIDENTS WITHOUT LOSSESKIRWIN FM.1979; LIBRARY J.; USA; DA. 1979; VOL. 104; NO 6; PP. 684-685Article

LIBRARY ACCESS FOR STUDENTS IN NONTRADITIONAL DEGREE PROGRAMSNOLAN M.1975; DREXEL LIBRARY QUART.; U.S.A.; DA. 1975; VOL. 11; NO 2; PP. 16-33; BIBL. 21 REF.Article

AMENDMENT TO REGULATIONS OF THE COMMISSIONER OF EDUCATION GOVERNING THE USE OF THE NEW YORK STATE LIBRARY1975; BOOKMARK.; U.S.A.; DA. 1975; VOL. 34; NO 4; PP. 105-108Article

Discriminating between readers: the case for a policy of flexibilityMORTIMER, Ian.Journal of the Society of Archivists. 2002, Vol 23, Num 1, pp 59-67, issn 0037-9816Article

Admissions monitoring system for Newcastle University LibraryMORROW, J.VINE. Very informal newsletter on library automation. 1986, Num 62, pp 48-50, issn 0305-5728Article

A study for control of client value using cluster analysisPARK, Hea-Sook; BAIK, Doo-Kwon.Journal of network and computer applications. 2006, Vol 29, Num 4, pp 262-276, issn 1084-8045, 15 p.Article

An overview of British Library automation at St. PancrasBUTCHER, R.Program (London. 1966). 1993, Vol 27, Num 3, pp 281-292, issn 0033-0337Article

Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamicsKOTANI, K; HORII, K.Behaviour & information technology (Print). 2005, Vol 24, Num 4, pp 289-302, issn 0144-929X, 14 p.Article

Data security and authentication in digital librariesKRISHNA KUMAR, C; GOPALAN, Poofa.Digital information exchange. Annual conference. 2004, pp 400-404, 1Vol, 5 p.Conference Paper

L'action culturelle aux archives = Cultural activities in archivesGAUTIER-DESVAUX, E.Gazette des archives. 1988, Num 141, pp 218-236, issn 0016-5522Article

Authentication and Access: Accommodating Public Users in an Academic WorldWEBER, Lynne; LAWRENCE, Peg.Information technology and libraries. 2010, Vol 29, Num 3, pp 128-140, issn 0730-9295, 13 p.Article

Social Construction of Authorized Users in the Digital AgeXIAOHUA ZHU; ESCHENFELDER, Kristin R.College & research libraries. 2010, Vol 71, Num 6, pp 548-568, issn 0010-0870, 21 p.Article

User Arrival in MIMO Interference Alignment NetworksNOSRAT-MAKOUEI, Behrang; ANDREWS, Jeffrey G; HEATH, Robert W et al.IEEE transactions on wireless communications. 2012, Vol 11, Num 2, pp 842-851, issn 1536-1276, 10 p.Article

Access without authentication : How and why we let anyone surf our wirelessWATKINS, Donna.Computers in libraries. 2006, Vol 26, Num 3, issn 1041-7915, 10-14, 50 [6 p.]Article

Students beat the queue and produce their own library cardsLOCKTON, Laurence.Computers in libraries. 2006, Vol 26, Num 6, issn 1041-7915, 3, 10-12, 50-52 [7 p.]Article

Anything, anytime, anywhere: Proxy servers, shibboleth, and the dream of the digital libraryMIKESELL, Brian L.Journal of library administration. 2004, Vol 41, Num 1-2, pp 315-326, issn 0193-0826, 12 p.Conference Paper

El mostrador de admisión. Diseño del mostrador para las âreas de admisión en la Unidad de Atención al Cliente (UAC) = The admission desk. Desk design for the Departments of Customer ServiceBLANQUER GREGORI, J. J; GALLEGOS, A. Alonso; LARNIA SANCHEZ, A et al.Medifam (Madrid). 2003, Vol 13, Num 2, pp 98-106, issn 1131-5768, 9 p.Article

Un système d'authentification avancé basé sur la technique OTP = An advanced authentification system based on the OTP conceptNOUALI-TABOUDJEMAT, Nadia; BENZAID, Mounir; MIHOUBI, Bachir et al.RIST. 2000, Vol 10, Num 1-2, issn 1111-0015, 3, 8, 13-25 [14 p.]Article

Using open source to provide remote patron authentication : Open source softwareWROSCH, Jackie.Library hi tech. 2005, Vol 23, Num 4, pp 520-525, issn 0737-8831, 6 p.Article

Authentication based on bioinformaticsMOHANDAS, M. K; SHET, K. C.Digital information exchange. Annual conference. 2004, pp 373-374, 1Vol, 2 p.Conference Paper

Korlátozható-e az internethasználat könyvtárakban és iskolákban? = Use of the Internet at libraries and schools: the pros and cons of limitationKESZTHELYI, Andras.Tudományos és műszaki tájékoztatás (Nyomtatott). 2004, Num 9, issn 0041-3917, 370, 379-384 [7 p.]Article

Managing access to electronic information : Progress and prospectsROBIETTE, Alan.Serials (United Kingdom Serials Group). 2001, Vol 14, Num 3, pp 301-304, issn 0953-0460Article

Nested IF-THEN-ELSE constructs in end-user computing : personality and aptitude as predictors of programming abilityHOUN-GEE CHEN; VECCHIO, R. P.International journal of man-machine studies. 1992, Vol 36, Num 6, pp 843-859, issn 0020-7373Article

Authentication and authorisation infrastructure for the mobility of users of academic libraries : An overview of developmentsHUDOMALJ, Emil; JAUK, Avgust.Program (London. 1966). 2006, Vol 40, Num 1, pp 63-73, issn 0033-0337, 11 p.Article

A novel approach for regenerating a private key using password, fingerprint and smart cardAHMED, Fawad; SIYAL, M. Y.Information management & computer security. 2005, Vol 13, Num 1, pp 39-54, issn 0968-5227, 16 p.Article

  • Page / 2