Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Library
Shelf Location
16 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Powell, Nelson Henry, III, author.
      Format: 
      Excerpt: 
      -power, lossy radio systems deployed in dense, random topologies, working sympathetically to sense and notify a
      by 
      Sanders, Christopher Artejus, author.
      Format: 
      Excerpt: 
      incorporate risk mitigation strategies to their portfolios of Information Systems Security Countermeasures
      by 
      Reaves, Bradley Galloway, author.
      Format: 
      Excerpt: 
      address call authentication. Both systems provide strong cryptographic authentication of callers. Authloop
      by 
      Roy, Tonmoy, author.
      Format: 
      Excerpt: 
      surface of interest with the goal of damage detection. However, unwanted information might be captured in
      by 
      Ferraiuolo, Andrew, author.
      Format: 
      Excerpt: 
      Information flow security is a promising approach for verifying hardware systems. Information flow
      by 
      Mishra, Pratik, author.
      Format: 
      Excerpt: 
      storage device (Hard Disk Drives HDDs) capabilities. 2) Multi-tier solutions focuses on systems design to
      by 
      Hashemi, Mohammad, author.
      Format: 
      Excerpt: 
      problem is that a 2D camera doesn't transfer depth information to the master. In such systems perceiving