Search Results

1 - 10 of 13,572 items :

Clear All

References ARMSTRONG, M., (2002). The Theory of Access Pricing and Interconnection, in CAVE, M. E., MAJUNDAR, S. K., VOGELSANG, I., (Eds.), Handbook of Telecommunications Economics: Vol. 1, structure, regulation and competition. Amsterdam: Elsevier Science, North-Holland (pp. 295-384). ARMSTRONG, M., VICKERS, J., (1998). The Access Pricing Problem with Deregulation: A Note. Journal of Industrial Economics , 46, pp. 115-121. ARMSTRONG, M., DOYLE, C., VICKERS, J., (1996). The Access Pricing Problem: A Synthesis, Journal of Industrial Economics , 44, pp. 131

REFERENCES 54/2014. (XII. 5.) BM Decree on the National Fire Protection Regulations (2014). Budapest: National Legislation. Berek, L. (2014). Security Systems . Budapest: National University of Public Service. Bunyitai, A. (2011). Location and role of access control systems in asset protection. Budapest: Hadmernok, VI.(4.), 17-25. Fishwick, P. A., & Hyungwook, P. (2008). Queue Modeling and Simulation. In Principles of Modeling and Simulation: A Multidisciplinary Approach. New Jersey, USA: John Wiley & Sons, Inc. Hanka, L. (2013). Applications for using

References 1. MacRae JM, Ahmed A, Johnson N, Levin A, Kiaii M. Central vein stenosis: A common problem in patients on hemodialysis. ASAIO J 2005;51:77-81. 2. III. NKF-K/DOQI Clinical Practice Guidelines for Vascular Access: Update 2000. Am J Kidney Dis 2001;37 1 (Suppl 1):S137-81. 3. Sun XF, Xiao Q, Wang Y, Hao LR, Lin HL, Zhang ZM, et al. Epidemiology of anticoagulation for hemodialysis patients: Survey of 842 cases in seven hemodialysis centers. Zhonghua Yi Xue Za Zhi 2009;89:577-81. 4. Pisoni RL, Young EW, Dykstra DM, Greenwood RN, Hecking E, Gillespie

. Springer Berlin Heidelberg, 2006. G. Danezis and P. Golle, eds. [6] Act no. 6 of 2003. Data Protection (Amendment) Act 2003, 2003. [7] Acxiom. Viewing and editing data about you. http://documentation.acxiom-online.com/aspect/#b6811t5921n/s-1/s15/s15b1851/s15b1859 [Accessed: 07- Jun- 2015]. [8] American Civil Liberties Union. Right to Know Act (ab 1291). https://www.aclunc.org/our-work/legislation/rightknow-act-ab-1291 [Accessed: 02- Jun- 2015]. [9] J. Angwin. Dragnet Nation: A quest for privacy, security, and freedom in a world of relentless surveillance. Times Books

References Asmuni, A. 2015. Effect of use of media social networking Edmodo against student’s participation in class discussion on teaching materials which are theoretical and practical. Conference: Seminar Nasional Hasil Penelitian Pendidikan dan Pembelajaran , Jawa Timur, Indonesia, vol. 1 No 1. Tahun. DOI: 10.13140/RG.2.2.17069.69602. Patel, B. H.–Thakkar A.–Shah P. 2017. Edmodo: ICT based collaborative learning tool in promoting professional learning platforms . Accessed via Research Gate at: https://www.researchgate.net/publication/317954157_Edmodo

Monitoring Techniques for TDM-Passive Optical Networks: A Survey, IEEE Communications Surveys & Tutorials, 2/2013, 943-958. [5] ITU-T L. 41: Maintenance wavelength on fibres carrying signals, Genewa, 2000. [6] ITU-T L. 66: Optical fibre cable maintenance criteria for in-service fibre testing in access networks, Genewa, 2007. [7] ITU-T L. 85: Optical fibre identification for the maintenance of optical access networks, Genewa, 2010. [8] Bentz C. M., Fritzsche D.: Field Trial of a Novel FTTH/PON Monitoring Technique Based on Unique Wavelength-Selective Mirror Combinations, NM

References [1] “Internet of Things - Lietiskais internets (IoT),” May 2016. [Online]. Available: https://cert.lv/uploads/Ieteikumi/OUCH-201605_lv.pdf [Accessed: January 25, 2017]. (in Latvian). [2] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4” Lecture Notes in Computer Science, pp. 1-24, 2001. https://doi.org/10.1007/3-540-45537-x_1 [3] Wi-Fi Alliance, “Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks,” White paper, University of Cape Town, 2003. [Online]. Available

References 1. Brescia MJ, Cimino JE, Appel K, Hurwich BJ. Chronic hemodialysis using venipuncture and a surgically created arteriovenous fistula. N Engl J Med 1966; 275: 1089-1092. 2. Tordoir J, Canaud B, Haage P, et al . EBPG on vascular access. Nephrol Dial Transplant 2007; 22(Suppl 2): ii88-117. 3. Mactier R, Davies S, Dudley C, et al .Summary of the 5th edition of the Renal Association Clinical Practice Guidelines (2009-2012). Nephron Clin Pract 2011; 118 Suppl 1: c27-70. 4. Jindal K, Chan CT, Deziel C, et al. Hemodialysis clinical practice

References AMIR, R.-LAMBSONV. E. (2000). On the Effects of Entry in Cournot Markets. Review of Economic Studies , 67(2), Pp. 235 - 254. DIXIT, A. (1986). Comparative Statics for Oligopoly. International economic review , 27(1), Pp. 107 - 112 . EGGERTSSON, T. (1990). Economic behavior and institutions , Cambridge: Cambridge University Press. ONEMLI, M. B. (2012). Access Pricing Under Imperfect Competition”, Review of Economic Perspectives . 12(1). Pp. 3-21. SPENCER, B. J.-BRANDER, J. A. (1983). Second Best Pricing of Publicly Produced Inputs. Journal of

developing countries, The Journal of Finance, Vol. 56, no. 1, pp. 87-130. Clarke, G. R., Cull, R., and Martinez Peria, M. S., (2001), Does foreign bank penetration reduce access to credit in developing countries? Evidence from asking borrowers, Evidence from Asking Borrowers (September 2001). World Bank Policy Research Working Paper 2716. Demirgüç-Kunt, T. B. A., and Levine, R., (2005), Law and firms’ access to finance, American Law and Economics Review, Vol. 7, no. 1, pp. 211-252. Djankov, S., McLiesh, C., and Shleifer, A., (2007), Private credit in 129 countries, Journal