69 results on '"Colin J. Fidge"'
Search Results
2. Service Colonies: A Novel Architectural Style for Developing Software Systems with Autonomous and Cooperative Services.
3. Microservices-based Software Systems Reengineering: State-of-the-Art and Future Directions.
4. Jump-Starting Software Engineering Careers.
5. Analysis of Attack Intensity on Autonomous Mobile Robots.
6. Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
7. Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems.
8. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture.
9. HIBAF: A data security scheme for fog computing.
10. A Simple High-Precision 2-Port Vector Analyzer.
11. Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
12. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.
13. Optimization of Airborne Scatterometer NRCS Semicircular Sampling for Sea Wind Retrieval.
14. Securing Manufacturing Using Blockchain.
15. A Review of Emerging Technologies for IoT-Based Smart Cities.
16. Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency.
17. A practical approach for detecting multi-tenancy data interference.
18. Mining Resource Profiles from Event Logs.
19. Scalable and efficient data distribution for distributed computing of all-to-all comparison problems.
20. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.
21. Specific Resonant Properties of Non-Symmetrical Microwave Antennas.
22. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes.
23. A scheduling-based dynamic fog computing framework for augmenting resource utilization.
24. Evaluating and predicting overall process risk using event logs.
25. Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems.
26. LibVM: an architecture for shared library sandboxing.
27. Precise relative clock synchronization for distributed control using TSC registers.
28. Domain-specific application analysis for customized instruction identification.
29. A Hardware Virtualization Based Component Sandboxing Architecture.
30. Data and process requirements for product recall coordination.
31. Partitioning composite web services for decentralized execution using a genetic algorithm.
32. Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance.
33. Workflow simulation for operational decision support.
34. Fault Evaluation for Security-Critical Communications Devices.
35. Procedure compilation in the refinement calculus.
36. Formal change impact analyses for emulated control software.
37. Information Flow Analysis for Fail-Secure Devices.
38. A theory for execution-time derivation in real-time programs.
39. Formal Semantics for Program Paths.
40. But What if I Don't Want to Wait Forever?
41. The Variety of Variables in Automated Real-Time Refinement.
42. Linear Approximation of Execution-Time Constraints.
43. The variety of variables in computer-aided real-time programming.
44. A formal model of real-time program compilation.
45. Lifting in Z.
46. Semantic characterisation of dead control-flow paths.
47. Computer-aided development of a real-time program.
48. Incremental Development of Real-Time Requirements: The Light Control Case Study.
49. The deadline command.
50. Real-Time Schedulability Tests for Preemptive Multitasking.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.