Search

Your search keyword '"Recovery procedure"' showing total 411 results

Search Constraints

Start Over You searched for: Descriptor "Recovery procedure" Remove constraint Descriptor: "Recovery procedure"
411 results on '"Recovery procedure"'

Search Results

251. A Hybrid Approach for Database Replication: Finding the Optimal Configuration between Update Everywhere and Primary Copy Paradigms

252. Patch based stress recovery for plate structures

253. On the role of enrichment and statical admissibility of recovered fields in a-posteriori error estimation for enriched finite element methods

254. Recuperación de macrorrestos vegetales en contextos arqueológicos

255. Discrete-time Loop Transfer Recovery Accounting Sampling Skew

256. Multistage compressed-sensing reconstruction of multiview images

257. An Autonomous Recovery System for a Rotorcraft UAV Operating in rough Seas

258. Impact of Different Extraction Recovery Method on Allowable Percentage of Reclaimed Asphalt Pavement (RAP)

259. Federate Fault Tolerance in HLA-Based Simulation

260. Operational Engineering of the COLUMBUS Thermal and Environmental Control System: Achievements, Optimizations

261. Self-consistent application of ion cyclotron wall conditioning for co-deposited layer removal and recovery of tokamak operation on TEXTOR

262. Analog to Digital Conversion Methods for Smart Sensing Systems

263. Spatial avoidance of hardware faults using FPGA partial reconfiguration of tile-based soft processors

264. Two-relaxation-time lattice Boltzmann method for the anisotropic dispersive Henry problem

265. Anisotropic Adaptation via a Zienkiewicz–Zhu Error Estimator for 2D Elliptic Problems

266. Improvements in the Sensor Recovery Mechanism for a Multisensor Control Scheme

267. Recovering Spikes from Noisy Neuronal Calcium Signals via Structured Sparse Approximation

268. Centralized/Decentralized Fault Diagnosis of Event-Driven Systems Based on Probabilistic Inference

269. Design of reduced-order observers with precise loop transfer recovery

270. AN IMPROVEMENT OF MAEKAWA'S MUTUAL EXCLUSION ALGORITHM TO MAKE IT FAULT-TOLERANT

271. Design of robust LQG optimal systems using partial loop transfer recovery

272. A new efficient ARQ scheme for satellite communications

273. Color Image of Tamper Detection and Recovery Using Block-Based Watermarking

274. A New CMAC-Based Local Recovery Approach to Achieve Reliable Multicast in Wireless Mesh Networks

275. Dynamic routing based on road connectivity for urban vehicular environments

276. Reliable and Highly Available Distributed Publish/Subscribe Service

277. Domain Decomposition and Interlaminar Stress Recovery of Multilayer Composite Structures

278. System Recovery

279. Guaranteed Quality of Recovery in WDM Mesh Networks

280. High-Reliability Multicast with New CMAC-Based Local Recovery Approach in Wireless Mesh Networks

281. Client-server password recovery

282. ODMRP-LR: ODMRP with Link Failure Detection and Local Recovery Mechanism

283. Client-Server Password Recovery

284. Backup Path Classification Based on Failure Risks for Efficient Backup Path Computation

285. Frequency-Shaped LQG/LTR Design: Application to the Robust Stabilization of an Helicopter 1

286. Analysis of steam generator U-tube rupture and intentional depressurization in LOBI-MOD2 facility

287. Accurate current measurement using drogued buoys employing Decca Navigator and Argos

288. Concurrent multi-layer restoration scheme for GMPLS based WDM networks

289. Efficiency Improvements for RBF Based Surface Measurement from 3D Point Cloud

290. Protection against Mobile Adversaries in Mobile Ad-hoc Networks

291. Improved Resolution of a GRACE Gravity Field Model by Regional Refinements

292. Robust methods for geometric primitive recovery and estimation from range images

293. Automation of the Volumetric Models Construction

294. Signal Recovery in Sinusoid-Crossing Sampling by use of the Minimum-Negativity Constraint

295. Performance Analysis of Rollback Recovery Schemes for the Mobile Computing Environment

296. Automatic security assessment of critical cyber-infrastructures

297. On the role of enrichment and statistical admissibility of recovered fields in a posteriori error estimation for enriched finite element methods

298. A distributed error recovery technique and its implementation and application on UNIX

299. Recovery of parametric models from range images: the case for superquadrics with global deformations

300. On A Fast Correlation Attack on Certain Stream Ciphers

Catalog

Books, media, physical & digital resources