77 results on '"Fidge, Colin"'
Search Results
2. Why do project managers underuse Management Information Systems theories in their management of IT projects?
3. Discovering a data interpreted petri net model of industrial control systems for anomaly detection
4. Automated detection-in-depth in industrial control systems
5. A scheduling-based dynamic fog computing framework for augmenting resource utilization
6. Analysis of Attack Intensity on Autonomous Mobile Robots.
7. Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems
8. Concept to Reality: An Integrated Approach to Testing Software User Interfaces.
9. A Bayesian Network-based customer satisfaction model: a tool for management decisions in railway transport
10. Domain-specific application analysis for customized instruction identification
11. Precise relative clock synchronization for distributed control using TSC registers
12. Optimization of Airborne Scatterometer NRCS Semicircular Sampling for Sea Wind Retrieval.
13. Partitioning composite web services for decentralized execution using a genetic algorithm
14. Identifying critical components during information security evaluations
15. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.
16. A Review of Emerging Technologies for IoT-Based Smart Cities.
17. A Data Normalization Technique for Detecting Cyber Attacks on UAVs.
18. Using Semicircular Sampling to Increase Sea-Wind Retrieval Altitude with a High-Altitude UAV Scatterometer.
19. Fault evaluation for security-critical communications devices
20. Linear Approximation of Execution-Time Constraints
21. The Variety of Variables in Automated Real-Time Refinement
22. But What if I Don't Want to Wait Forever?
23. Computer-aided development of a real-time program
24. A theory for execution-time derivation in real-time programs
25. A formal method for building concurrent real-time software
26. Fundamentals of distributed system observation
27. HIBAF: A data security scheme for fog computing.
28. Formal Semantics for Program Paths
29. Logical time in distributed computing systems
30. The Variety of Variables in Computer-Aided Real-Time Programming
31. A formal model of real-time program compilation
32. Lifting in Z
33. A practical approach for detecting multi-tenancy data interference.
34. Anatomy of log files: Implications for information accountability measures.
35. Preface: Volume 42
36. LibVM: an architecture for shared library sandboxing.
37. A distributed computing framework for All-to-All comparison problems.
38. Multifaceted Modelling of Complex Business Enterprises.
39. Intrusion detection in distributed systems, an approach based on taint marking.
40. Algorithm clustering for multi-algorithm processor design.
41. A conditional retransmission enabled transport protocol for real-time networked control systems.
42. Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance.
43. A Medical Data Reliability Assessment Model.
44. Integrating hardware and software information flow analyses.
45. GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback–Leibler Divergence.
46. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.
47. Specific Resonant Properties of Non-Symmetrical Microwave Antennas.
48. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes.
49. A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer.
50. Low Profile Sinuous Slot Antenna for UWB Sensor Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.