Search ResultsElectronic Resources 
by
Giwah, Anthony Duke, author.
Format:
Excerpt:
Nova Southeastern University. Information Systems (DISS). degree granting institution.
by
Trembley, Daniel K., author.
Format:
Excerpt:
consequences. As CPS systems become more common, and higher levels of autonomy are embedded within them, the
by
Powell, Nelson Henry, III, author.
Format:
Excerpt:
-power, lossy radio systems deployed in dense, random topologies, working sympathetically to sense and notify a
by
Sanders, Christopher Artejus, author.
Format:
Excerpt:
incorporate risk mitigation strategies to their portfolios of Information Systems Security Countermeasures
by
Reaves, Bradley Galloway, author.
Format:
Excerpt:
address call authentication. Both systems provide strong cryptographic authentication of callers. Authloop
by
Roy, Tonmoy, author.
Format:
Excerpt:
surface of interest with the goal of damage detection. However, unwanted information might be captured in
by
Sun, Ying, author.
Format:
Excerpt:
information. Two types of regularization methods are considered, namely, shrinking the raw estimator to a
by
Zhang, He, author.
Format:
Excerpt:
-based navigation systems that use a camera for pose estimation have been intensively studied. Several vision
by
Ferraiuolo, Andrew, author.
Format:
Excerpt:
Information flow security is a promising approach for verifying hardware systems. Information flow
by
Mishra, Pratik, author.
Format:
Excerpt:
storage device (Hard Disk Drives HDDs) capabilities. 2) Multi-tier solutions focuses on systems design to
by
Hashemi, Mohammad, author.
Format:
Excerpt:
problem is that a 2D camera doesn't transfer depth information to the master. In such systems perceiving
by
Alizadeh, Yasser, author.
Format:
Excerpt:
is used to represent qualitative information about complex systems as networks of casual

Select an Action





