Search ResultsElectronic Resources 
by
Murmuria, Rahul, author. (orcid)0000-0001-6327-9609
Format:
Excerpt:
access control mechanism to the device, their application poses new security risks and it does not
by
Xue, Jiachen, author.
Format:
Excerpt:
provides hop-by-hop flow control but not end-to-end congestion control. (2) The well-known incast problem
by
Kibble, Geoffrey A., author.
Format:
Excerpt:
often provide benefits with the expense of drag or increased cost. Many flow control methods have come
by
Rodolfo, Inês Martins Sequeira, author.
Format:
Excerpt:
gaining control over their personal health information in a seamless way. Most importantly, so that people
by
Wang, Ying, author.
Format:
Excerpt:
, time division, power control, and space division. Nevertheless, many problems not addressed adequately
by
Williamson, John, author.
Format:
Excerpt:
probabilistic selection technique based on the detection of control. Methods are presented for displaying the
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
Strategies; 5. Ineffective Exception-handling Design Patterns; References; Chapter 6. Managing Control
by
Davis, John McDonald Cameron, author.
Format:
Excerpt:
implementation via the network control programs are considered. Chapter 3 examines the interconnection of network
by
Rubinoff, Morris.
Format:
Excerpt:
. Techniques of System Access Control; 3. Computer Characteristics Supporting Information Security; 4
by
Behzadnia, Peyman, author.
Format:
Excerpt:
integrated with model predictive control (MPC) strategy to minimize power consumption of the disk
by
Kurkcu, Abdullah, author.
Format:
Excerpt:
information-sharing, drivers will have the opportunity of putting themselves in control of their own destiny
by
Fernandez Gonzalez, Enrique, author.
Format:
Excerpt:
planning problems by supporting convex quadratic constraints on state variables and control variables that

Select an Action





