Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
101 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Kibble, Geoffrey A., author.
      Format: 
      Excerpt: 
      often provide benefits with the expense of drag or increased cost. Many flow control methods have come
      by 
      Murmuria, Rahul, author. (orcid)0000-0001-6327-9609
      Format: 
      Excerpt: 
      access control mechanism to the device, their application poses new security risks and it does not
      by 
      Wang, Ying, author.
      Format: 
      Excerpt: 
      , time division, power control, and space division. Nevertheless, many problems not addressed adequately
      by 
      Williamson, John, author.
      Format: 
      Excerpt: 
      probabilistic selection technique based on the detection of control. Methods are presented for displaying the
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      Strategies; 5. Ineffective Exception-handling Design Patterns; References; Chapter 6. Managing Control
      by 
      Davis, John McDonald Cameron, author.
      Format: 
      Excerpt: 
      implementation via the network control programs are considered. Chapter 3 examines the interconnection of network
      by 
      Rubinoff, Morris.
      Format: 
      Excerpt: 
      . Techniques of System Access Control; 3. Computer Characteristics Supporting Information Security; 4
      by 
      Behzadnia, Peyman, author.
      Format: 
      Excerpt: 
      integrated with model predictive control (MPC) strategy to minimize power consumption of the disk