Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
Switch to list view
Switch to thumbnail view
101 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Liu, Feng, author.
      Format: 
      Excerpt: 
      sequentially to respect data and control dependences. Second, static methods cannot fully exploit speculation
      by 
      Azahndeh, Koorosh, author.
      Format: 
      Excerpt: 
      techniques, especially when it deals with the control overhead costs and network latency. Additionally, multi
      by 
      Fan, Xinyi, author.
      Format: 
      Excerpt: 
      applications, including quality-control for manufacturing, online retailing, entertainment with virtual reality
      by 
      Oluwatimi, Oyindamola D., author.
      Format: 
      Excerpt: 
      . As a direct consequence, the technologies utilized determine the types of contextual access control
      by 
      Nwafor, Ebelechukwu, author.
      Format: 
      Excerpt: 
      collection using a provenance anomaly-based intrusion detection system (IDS) in a climate control system and
      by 
      Thames, Lane. editor.
      Format: 
      Excerpt: 
      Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical
      by 
      Crawford, Chris S., author.
      Format: 
      Excerpt: 
      into applications for various purposes such as device control, user-state monitoring, training and
      by 
      Lankhorst, Marc. author.
      Format: 
      Excerpt: 
      An enterprise architecture tries to describe and control an organisation’s structure, processes
      Go to:Search Results
      |
      Search Facets
      |
      Top of Page