Annual Subscription

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Subscription-enhanced Content Delivery

In existing content delivery systems user accesses are popularly used for predicting the request pattern of contents. In novel web applications such as publish/subscribe services, users explicitly provide statements of interest in the form of subscriptions. These subscriptions provide another source of user information in addition to access patterns. This paper addresses the content delivery pr...

متن کامل

Feed Subscription Management

An increasing number of data sources and services are made available on the Web, and in many cases these information sources are or easily could be made available as feeds. However, the more data sources and services are exposed through feed-based services, the more it becomes necessary to manage and be able to share those services, so that users and uses of those services can build on the foun...

متن کامل

Diesel Particulate Filters [subscription]

● Diesel Filter Regeneration Abstract: Diesel particulate filters capture particle emissions through a combination of surface-type and deep-bed filtration mechanisms, such as diffusional deposition, inertial d positi , or flow-line interception. Collected particulates are removed from the filter, continuously or periodically, through thermal regeneration. Diesel filters are very effective in co...

متن کامل

Pitfalls of lazy subscription ∗

Transactional Lock Elision (TLE) uses Hardware Transactional Memory (HTM) to execute unmodified critical sections concurrently, even if they are protected by the same lock. To ensure correctness, the transactions used to execute these critical sections “subscribe” to the lock by reading it and checking that it is available. A recent paper proposed using the tempting “lazy subscription” optimiza...

متن کامل

Anonymous Subscription Protocols

In this paper we discuss protocols that allow a user to subscribe to an electronic service, and then anonymously access the service. That is, the provider does not know who accesses the service at any time, and moreover he cannot link two accesses to the same person. On the other hand, the supplier obtains proof that the user is authorized to access the service. We formally define the problem, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the Royal College of Psychiatrists

سال: 1981

ISSN: 0140-0789,2514-9954

DOI: 10.1192/s0140078900012633