97 results on '"Colin J. Fidge"'
Search Results
2. Service Colonies: A Novel Architectural Style for Developing Software Systems with Autonomous and Cooperative Services.
3. Microservices-based Software Systems Reengineering: State-of-the-Art and Future Directions.
4. Jump-Starting Software Engineering Careers.
5. Analysis of Attack Intensity on Autonomous Mobile Robots.
6. Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
7. Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems.
8. A Resilient Fog-IoT Framework for Seamless Microservice Execution.
9. Microservice Remodularisation of Monolithic Enterprise Systems for Embedding in Industrial IoT Networks.
10. Securing Manufacturing Using Blockchain.
11. Remodularization Analysis for Microservice Discovery Using Syntactic and Semantic Clustering.
12. Design Guidelines for Effective Occupation-Based Personal Health Records.
13. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture.
14. HIBAF: A data security scheme for fog computing.
15. Business Object Centric Microservices Patterns.
16. Availability and Scalability Optimized Microservice Discovery from Enterprise Systems.
17. Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling.
18. An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records.
19. A Simple High-Precision 2-Port Vector Analyzer.
20. Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
21. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.
22. Optimization of Airborne Scatterometer NRCS Semicircular Sampling for Sea Wind Retrieval.
23. Discovering Microservices in Enterprise Systems Using a Business Object Containment Heuristic.
24. Function-Splitting Heuristics for Discovery of Microservices in Enterprise Systems.
25. Employees' perceptions of sharing employer-sponsored personal health records.
26. A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic.
27. Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies.
28. Authenticated encryption for time-sensitive critical infrastructure.
29. A Review of Emerging Technologies for IoT-Based Smart Cities.
30. Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency.
31. A practical approach for detecting multi-tenancy data interference.
32. Anatomy of log files: Implications for information accountability measures.
33. Personal health records as sources of productivity evidence.
34. Mining Resource Profiles from Event Logs.
35. Scalable and efficient data distribution for distributed computing of all-to-all comparison problems.
36. Planting Bugs: A System for Testing Students' Unit Tests.
37. Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems.
38. Distributed computing of all-to-all comparison problems in heterogeneous systems.
39. Component Modeling for SCADA Network Mapping.
40. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.
41. Specific Resonant Properties of Non-Symmetrical Microwave Antennas.
42. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes.
43. A scheduling-based dynamic fog computing framework for augmenting resource utilization.
44. Evaluating and predicting overall process risk using event logs.
45. Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems.
46. HIBAF: A data security scheme for fog computing
47. LibVM: an architecture for shared library sandboxing.
48. Automated detection-in-depth in industrial control systems
49. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture
50. A Simple High-Precision 2-Port Vector Analyzer
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.