469 results on '"Howard, E"'
Search Results
2. TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems.
3. Keeping Safe Rust Safe with Galeed.
4. Rigorous Machine Learning for Secure and Autonomous Cyber Physical Systems.
5. Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems.
6. Derivation of JPSS-2 CRIS Pre-Launch Spectral Calibration Parameters from the Thermal Vacuum Test Data.
7. Preventing Kernel Hacks with HAKCs.
8. FirmFuzz: Automated IoT Firmware Introspection and Analysis.
9. Modeling human planning in a life-like search-and-rescue mission.
10. An Agile IT-Enabled Social Startup.
11. There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection.
12. Highly Assured Safety and Security of e-Health Applications.
13. RADMAX: Risk and Deadline Aware Planning for Maximum Utility.
14. A rigorous and efficient run-time security monitor for real-time critical embedded system applications.
15. Missing the Point(er): On the Effectiveness of Code Pointer Integrity.
16. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.
17. Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems.
18. A mechanism for inhibition in visual search.
19. Silicon-on-insulator (SOI) integration for organic field effect transistor (OFET) based circuits.
20. Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT.
21. A Practical Activity Capture Framework for Personal, Lifetime User Modeling.
22. Towards intelligent mapping applications: a study of elements found in cognitive maps.
23. Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks.
24. Cognitive Adaptive Radio Teams.
25. Hierarchical Agglomerative Clustering Based T-outlier Detection.
26. Simultaneous localization, calibration, and tracking in an ad hoc sensor network.
27. Artificial Neural Networks Using Complex Numbers and Phase Encoded Weights - Electronic and Optical Implementations.
28. AWDRAT: A Cognitive Middleware System for Information Survivability.
29. A Search Engine Technique Using Relation Based Keywords.
30. Using Heat Plumes in Controlled Breathing as Non-Contact Assistive Technology.
31. Concepts for the Design, Development and Operation of a Hand-held Remote Decision Support Aid for Novice Nurses.
32. A location representation for generating descriptive walking directions.
33. Task Oriented Machine-Learning and Review.
34. Data Clustering Via Spiking Neural Networks through Spike Timing-Dependent Plasticity.
35. CMOS Implementation of Phase-Encoded Complex-Valued Artificial Neural Networks.
36. One-Push Sharing: Facilitating Picture Sharing from Camera Phones.
37. N-Codes: A Computerized Decision Support System for Acute Care Nursing.
38. Activity Zones for Context-Aware Computing.
39. Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network.
40. Using Semantic Networks for Knowledge Representation in an Intelligent Environment.
41. Perseveration in attention: Inhibitory feature-based attentional sets automatically carry over to novel task contexts.
42. Processing Landsat TM data using complex valued neural networks.
43. Computational Vulnerability Analysis for Information Survivability.
44. Model-Based Diagnosis for Information Survivability.
45. Results of the Second International Workshop on Self-adaptive Software.
46. Introduction to Self-adaptive Software: Applications.
47. Probabilistic Dispatch, Dynamic Domain Architecture, and Self-adaptive Software.
48. Design Principles for Resource Management Systems for Intelligent Spaces.
49. Influences of Sources of Communication on Adoption of a Communication Technology.
50. A complete and optimal data allocation method for practical discrete multitone systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.