Advanced search options
You searched for subject:(Access Control Methods)
.
Showing records 1 – 12 of
12 total matches.
▼ Search Limiters
Brno University of Technology
1. Frdlík, Tomáš. Řízení přístupu v sítích IP: Access Control in IP Networks.
Degree: 2018, Brno University of Technology
URL: http://hdl.handle.net/11012/84250
Subjects/Keywords: AC metody; Gaussova metoda; neuronové sítě; metody řízení přístupu; QoS; AC methods; access control methods; Gaussian method; neuronové sítě; QoS
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Frdlík, T. (2018). Řízení přístupu v sítích IP: Access Control in IP Networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/84250
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2018. Thesis, Brno University of Technology. Accessed January 18, 2021. http://hdl.handle.net/11012/84250.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2018. Web. 18 Jan 2021.
Vancouver:
Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/11012/84250.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/84250
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Brno University of Technology
2. Frdlík, Tomáš. Řízení přístupu v sítích IP: Access Control in IP Networks.
Degree: 2019, Brno University of Technology
URL: http://hdl.handle.net/11012/82394
Subjects/Keywords: AC metody; Gaussova metoda; neuronové sítě; metody řízení přístupu; QoS; AC methods; access control methods; Gaussian method; neuronové sítě; QoS
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Frdlík, T. (2019). Řízení přístupu v sítích IP: Access Control in IP Networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82394
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2019. Thesis, Brno University of Technology. Accessed January 18, 2021. http://hdl.handle.net/11012/82394.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2019. Web. 18 Jan 2021.
Vancouver:
Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/11012/82394.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/82394
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
ETH Zürich
3. Werthmüller, Tanja. Efficient evaluation of PBel access control policies.
Degree: 2013, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/153956
Subjects/Keywords: SPEZIELLE PROGRAMMIERMETHODEN; ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); SPECIAL PROGRAMMING METHODS; ACCESS CONTROL (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Werthmüller, T. (2013). Efficient evaluation of PBel access control policies. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/153956
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Thesis, ETH Zürich. Accessed January 18, 2021. http://hdl.handle.net/20.500.11850/153956.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Web. 18 Jan 2021.
Vancouver:
Werthmüller T. Efficient evaluation of PBel access control policies. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/20.500.11850/153956.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Werthmüller T. Efficient evaluation of PBel access control policies. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/153956
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Penn State University
4. O'Neill, Tara Anne. Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life.
Degree: 2018, Penn State University
URL: https://submit-etda.libraries.psu.edu/catalog/15513tao5012
Subjects/Keywords: In order to ensure long-term adoption and use of augmentative and alternative communication (AAC) technologies; they must be designed to support children to participate within everyday activities and routines that are prioritized by families. Nine parents of children with cerebral palsy who used AAC technologies participated in semi-structured interviews to provide their perspectives of how AAC technologies were integrated into the functional contexts of everyday life. Five major themes emerged from the discussions: (a) integrating AAC into life; (b) AAC technologies; (c) child needs and skills; (d) parent responsibilities and priorities; and (e) AAC process and decision-making. Children were able to use AAC technologies within a variety of everyday contexts with various partners; however; challenges included access to AAC within physical and outdoor activities and partners who lacked knowledge regarding operational competencies and effective interaction strategies. In order to integrate AAC technologies into life; parents prioritized technology features including ease of programming; improved physical design (e.g.; lighter; wearable; easy to mount; durable); features to enhance efficiency and ease of access (e.g.; brain-computer interface; sentence prediction); and availably of multiple functions and features (e.g.; facial recognition software; augmented reality; projection capabilities; capability to control wheelchair). AAC manufacturers and mainstream technology developers should work to ensure that technologies are responsive to the supports; limitations; and ideal features identified by parents. Future research should seek input from a larger group of stakeholders and use longitudinal methods to examine perceptions of AAC technologies over time. Keywords: technology design; augmentative and alternative communication; parents; cerebral palsy; service delivery; technology design; family
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
O'Neill, T. A. (2018). Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15513tao5012
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
O'Neill, Tara Anne. “Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life.” 2018. Thesis, Penn State University. Accessed January 18, 2021. https://submit-etda.libraries.psu.edu/catalog/15513tao5012.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
O'Neill, Tara Anne. “Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life.” 2018. Web. 18 Jan 2021.
Vancouver:
O'Neill TA. Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Jan 18]. Available from: https://submit-etda.libraries.psu.edu/catalog/15513tao5012.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
O'Neill TA. Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15513tao5012
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Université de Sherbrooke
5. Huynh, Nghi. Vérification et validation de politiques de contrôle d'accès dans le domaine médical.
Degree: 2017, Université de Sherbrooke
URL: http://hdl.handle.net/11143/10155
Subjects/Keywords: Contrôle d'accès; Méthodes formelles; Sécurité; Protection des données; Vérification; Validation; Politique de sécurité; Access control; Formal methods
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Huynh, N. (2017). Vérification et validation de politiques de contrôle d'accès dans le domaine médical. (Doctoral Dissertation). Université de Sherbrooke. Retrieved from http://hdl.handle.net/11143/10155
Chicago Manual of Style (16th Edition):
Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical.” 2017. Doctoral Dissertation, Université de Sherbrooke. Accessed January 18, 2021. http://hdl.handle.net/11143/10155.
MLA Handbook (7th Edition):
Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical.” 2017. Web. 18 Jan 2021.
Vancouver:
Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical. [Internet] [Doctoral dissertation]. Université de Sherbrooke; 2017. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/11143/10155.
Council of Science Editors:
Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical. [Doctoral Dissertation]. Université de Sherbrooke; 2017. Available from: http://hdl.handle.net/11143/10155
6. Hilia, Mohamed. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.
Degree: Docteur es, Informatique, 2013, Université Paris-Est
URL: http://www.theses.fr/2013PEST1198
Subjects/Keywords: Web sémantique; Environnement mutli-Domaines; Contol d'accès et d'usage; Architecture orienté services; Méthodes formelle; Composition de services; Semantic Web; Multi-Domains environnement; Access and usage control; Service oriented architecture; Formal methods; Service composition
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Hilia, M. (2013). Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2013PEST1198
Chicago Manual of Style (16th Edition):
Hilia, Mohamed. “Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.” 2013. Doctoral Dissertation, Université Paris-Est. Accessed January 18, 2021. http://www.theses.fr/2013PEST1198.
MLA Handbook (7th Edition):
Hilia, Mohamed. “Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.” 2013. Web. 18 Jan 2021.
Vancouver:
Hilia M. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. [Internet] [Doctoral dissertation]. Université Paris-Est; 2013. [cited 2021 Jan 18]. Available from: http://www.theses.fr/2013PEST1198.
Council of Science Editors:
Hilia M. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. [Doctoral Dissertation]. Université Paris-Est; 2013. Available from: http://www.theses.fr/2013PEST1198
7. Konopacki, Pierre. Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods.
Degree: Docteur es, Informatique, 2012, Université Paris-Est
URL: http://www.theses.fr/2012PEST1089
Subjects/Keywords: Méthodes formelles; Contrôle d\'accès; Sécurité; Formal methods; Access control; Security
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Konopacki, P. (2012). Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2012PEST1089
Chicago Manual of Style (16th Edition):
Konopacki, Pierre. “Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods.” 2012. Doctoral Dissertation, Université Paris-Est. Accessed January 18, 2021. http://www.theses.fr/2012PEST1089.
MLA Handbook (7th Edition):
Konopacki, Pierre. “Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods.” 2012. Web. 18 Jan 2021.
Vancouver:
Konopacki P. Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods. [Internet] [Doctoral dissertation]. Université Paris-Est; 2012. [cited 2021 Jan 18]. Available from: http://www.theses.fr/2012PEST1089.
Council of Science Editors:
Konopacki P. Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods. [Doctoral Dissertation]. Université Paris-Est; 2012. Available from: http://www.theses.fr/2012PEST1089
8. Huynh, Nghi. Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies.
Degree: Docteur es, Informatique, 2016, Université Paris-Est
URL: http://www.theses.fr/2016PESC1042
Subjects/Keywords: Méthodes formelles; Vérification; Contrôle d'accès; Dmp; Médical; Formal methods; Verification; Access control; Ehr; Healthcare
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Huynh, N. (2016). Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2016PESC1042
Chicago Manual of Style (16th Edition):
Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies.” 2016. Doctoral Dissertation, Université Paris-Est. Accessed January 18, 2021. http://www.theses.fr/2016PESC1042.
MLA Handbook (7th Edition):
Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies.” 2016. Web. 18 Jan 2021.
Vancouver:
Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies. [Internet] [Doctoral dissertation]. Université Paris-Est; 2016. [cited 2021 Jan 18]. Available from: http://www.theses.fr/2016PESC1042.
Council of Science Editors:
Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies. [Doctoral Dissertation]. Université Paris-Est; 2016. Available from: http://www.theses.fr/2016PESC1042
University of Arkansas
9. Morovat, Katanosh. Designing Secure Access Control Model in Cyber Social Networks.
Degree: PhD, 2017, University of Arkansas
URL: https://scholarworks.uark.edu/etd/2390
Subjects/Keywords: Access Control Methods; Cybersecurity; Social Network; Information Security
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Morovat, K. (2017). Designing Secure Access Control Model in Cyber Social Networks. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2390
Chicago Manual of Style (16th Edition):
Morovat, Katanosh. “Designing Secure Access Control Model in Cyber Social Networks.” 2017. Doctoral Dissertation, University of Arkansas. Accessed January 18, 2021. https://scholarworks.uark.edu/etd/2390.
MLA Handbook (7th Edition):
Morovat, Katanosh. “Designing Secure Access Control Model in Cyber Social Networks.” 2017. Web. 18 Jan 2021.
Vancouver:
Morovat K. Designing Secure Access Control Model in Cyber Social Networks. [Internet] [Doctoral dissertation]. University of Arkansas; 2017. [cited 2021 Jan 18]. Available from: https://scholarworks.uark.edu/etd/2390.
Council of Science Editors:
Morovat K. Designing Secure Access Control Model in Cyber Social Networks. [Doctoral Dissertation]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2390
10. Martinoia, Diego. Proving Correctness within an Access Control Evaluation Framework.
Degree: 2013, University of Illinois – Chicago
URL: http://hdl.handle.net/10027/10132
Subjects/Keywords: Access Control; Formal Methods; Correctness; PVS; Verification
…access control, we must add some specificity to the representation. More specifically, the list… …explaining the rest of the theory. 2.1 Access Control Model Definition 1 (Access Control… …Model). An Access Control Model (ACM) M is a tuple S, Q, |= such that: • S… …Model). Access Matrix type A (AMa ) is the simplest type of access control… …graph, adding labelled edges that represent how actions affect the states. 2.2 Access Control…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Martinoia, D. (2013). Proving Correctness within an Access Control Evaluation Framework. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/10132
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Martinoia, Diego. “Proving Correctness within an Access Control Evaluation Framework.” 2013. Thesis, University of Illinois – Chicago. Accessed January 18, 2021. http://hdl.handle.net/10027/10132.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Martinoia, Diego. “Proving Correctness within an Access Control Evaluation Framework.” 2013. Web. 18 Jan 2021.
Vancouver:
Martinoia D. Proving Correctness within an Access Control Evaluation Framework. [Internet] [Thesis]. University of Illinois – Chicago; 2013. [cited 2021 Jan 18]. Available from: http://hdl.handle.net/10027/10132.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Martinoia D. Proving Correctness within an Access Control Evaluation Framework. [Thesis]. University of Illinois – Chicago; 2013. Available from: http://hdl.handle.net/10027/10132
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Oxford
11. Slaymaker, Mark Arthur. The formalisation and transformation of access control policies.
Degree: PhD, 2011, University of Oxford
URL: http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973
Subjects/Keywords: 621.382; Computer security; Computing; Software Engineering; Formal Methods; Access Control Modelling; Transformation
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Slaymaker, M. A. (2011). The formalisation and transformation of access control policies. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973
Chicago Manual of Style (16th Edition):
Slaymaker, Mark Arthur. “The formalisation and transformation of access control policies.” 2011. Doctoral Dissertation, University of Oxford. Accessed January 18, 2021. http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973.
MLA Handbook (7th Edition):
Slaymaker, Mark Arthur. “The formalisation and transformation of access control policies.” 2011. Web. 18 Jan 2021.
Vancouver:
Slaymaker MA. The formalisation and transformation of access control policies. [Internet] [Doctoral dissertation]. University of Oxford; 2011. [cited 2021 Jan 18]. Available from: http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973.
Council of Science Editors:
Slaymaker MA. The formalisation and transformation of access control policies. [Doctoral Dissertation]. University of Oxford; 2011. Available from: http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973
12. Giannakopoulos, Theophilos John. Multi-Decision Policy and Policy Combinator Specifications.
Degree: MS, 2012, Worcester Polytechnic Institute
URL: etd-022112-163738
;
https://digitalcommons.wpi.edu/etd-theses/166
Subjects/Keywords: formal methods; access control; policy combinators; policies; specifications; Margrave
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Giannakopoulos, T. J. (2012). Multi-Decision Policy and Policy Combinator Specifications. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Giannakopoulos, Theophilos John. “Multi-Decision Policy and Policy Combinator Specifications.” 2012. Thesis, Worcester Polytechnic Institute. Accessed January 18, 2021. etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Giannakopoulos, Theophilos John. “Multi-Decision Policy and Policy Combinator Specifications.” 2012. Web. 18 Jan 2021.
Vancouver:
Giannakopoulos TJ. Multi-Decision Policy and Policy Combinator Specifications. [Internet] [Thesis]. Worcester Polytechnic Institute; 2012. [cited 2021 Jan 18]. Available from: etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Giannakopoulos TJ. Multi-Decision Policy and Policy Combinator Specifications. [Thesis]. Worcester Polytechnic Institute; 2012. Available from: etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation