Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
101 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Metzgar, Jonathan Brian, author.
      Format: 
      Excerpt: 
      transport between radiance probes based on statistical measurement of visibility. We control the depth of
      by 
      Gao, Ning, author.
      Format: 
      Excerpt: 
      -core environments and it adopts a hybrid of optimistic concurrency control and two-phase commit protocols to narrow
      by 
      Reddeddy, Sanath Kumar Reddy, author.
      Format: 
      Excerpt: 
      Our approach to this thesis, to design role management model to control user authority and to
      by 
      Mani Gupta, Arjun, author.
      Format: 
      Excerpt: 
      into the frame, and so it can be controlled by either the user or an attendant. This control is most
      by 
      Anderson, David, author.
      Format: 
      Excerpt: 
      , information about which clauses most often differ based on control flow was extracted as well as counts for
      by 
      Kumar, Mohit, author.
      Format: 
      Excerpt: 
      languages used in ICT systems. We evaluate energy consumption of data types, operators, control statements
      by 
      Gundala palle, Santosh reddy, author.
      Format: 
      Excerpt: 
      Controlling Applications etc.) in IoT which requires quick response to react and control the situations if
      by 
      Chakma, Avijoy, author.
      Format: 
      Excerpt: 
      system. An efficient PM2.5 monitoring is of great benefit for human health and air pollution control. In
      by 
      Ogemuno, Emamuzo Cletus, author.
      Format: 
      Excerpt: 
      network access control. Also known as typing dynamics, keystroke refers to a method that identifies users