Search ResultsElectronic Resources
by
Liu, Feng, author.
Format:
Excerpt:
sequentially to respect data and control dependences. Second, static methods cannot fully exploit speculation
by
Azahndeh, Koorosh, author.
Format:
Excerpt:
techniques, especially when it deals with the control overhead costs and network latency. Additionally, multi
by
Fan, Xinyi, author.
Format:
Excerpt:
applications, including quality-control for manufacturing, online retailing, entertainment with virtual reality
by
Oluwatimi, Oyindamola D., author.
Format:
Excerpt:
. As a direct consequence, the technologies utilized determine the types of contextual access control
by
Nwafor, Ebelechukwu, author.
Format:
Excerpt:
collection using a provenance anomaly-based intrusion detection system (IDS) in a climate control system and
by
Thames, Lane. editor.
Format:
Excerpt:
Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical
by
Bandekar, Ashutosh, author.
Format:
Excerpt:
limited power resource available to these wireless devices. Since users, as well as attackers, can control
by
Crawford, Chris S., author.
Format:
Excerpt:
into applications for various purposes such as device control, user-state monitoring, training and
by
Kang, Tae Seung, author.
Format:
Excerpt:
control problem of the cart-pole (inverted pendulum) and fish locomotion. Experiments demonstrate that the
by
Sylvertooth, Randall Earl, author.
Format:
Excerpt:
for the future performance of other emerging AI robotic control systems, as they come online in the
by
Lankhorst, Marc. author.
Format:
Excerpt:
An enterprise architecture tries to describe and control an organisation’s structure, processes
by
Xu, Bo, author.
Format:
Excerpt:
number of control points. In addition to this idea, the super-reduced idea and the mesh refinement are





