1,383 results on '"Barker, Steve"'
Search Results
2. An artificial neural network to estimate the foliar and ground cover input variables of the Rangeland Hydrology and Erosion Model
3. Dam asset monitoring using the internet of things and digital cloud technology
4. A novel high CMRR trans-impedance instrumentation amplifier for biomedical applications
5. Operation Sea Signal
6. An Artificial Neural Network to Estimate the Foliar and Ground Cover Input Variables of the Rangeland Hydrology and Erosion Model
7. A 10.5 ppm/°C Modified Sub-1 V Bandgap in 28 nm CMOS Technology with Only Two Operating Points.
8. An OTA gain enhancement technique for low power biomedical applications
9. Increasing signal to noise ratio and minimizing artefacts in biomedical instrumentation systems
10. Simulation of driver fatigue monitoring via blink rate detection, using 65 nm CMOS technology
11. Dynamic Event-Based Access Control as Term Rewriting
12. A CMOS blood cancer detection sensor based on frequency deviation detection
13. Logical Approaches to Authorization Policies
14. The Scientific Contribution of Marek Sergot
15. Socially Constructed Trust for Distributed Authorization
16. Dynamics in Delegation and Revocation Schemes: A Logical Approach
17. Secommunity: A Framework for Distributed Access Control
18. A Logic of Privacy
19. Dynamic Meta-level Access Control in SQL
20. Coherent Design Rationale and its importance to the Remanufacturing Sector
21. Using The Delphi Technique To Establish A Robust Research Agenda For Remanufacturing
22. Term Rewriting for Access Control
23. Web Resource Usage Control in RSCLP
24. RBAC Policy Implementation for SQL Databases
25. Deductive Database Security
26. Implementing RBAC Policies
27. Distributed Access Control: A Logic-Based Approach
28. Flexible Security Policies in SQL
29. Access Control for Deductive Databases by Logic Programming
30. Protecting Deductive Databases from Unauthorized Retrievals
31. Secure Deductive Databases
32. TRBACN: A Temporal Authorization Model
33. Information Security: A Logic-Based Approach
34. Temporal Authorization in the Simplified Event Calculus
35. Data Protection by Logic Programming
36. Panel Session: What Are the Key Challenges in Distributed Security?
37. A Meta-Model of Access Control in a Fibred Security Language
38. Supporting Students in a Changing Educational Climate: A Systems Engineering Case Study
39. How chatbots help
40. Design, Analysis and Experimental Verification of the Self-Resonant Inverter for Induction Heating Crucible Melting Furnace Based on IGBTs Connected in Parallel
41. Event-oriented Web-based E-trading
42. Action Control by Term Rewriting
43. Geologic and Geophysical Constraints on Crustal Type and Tectonic Evolution of the Gulf of Mexico
44. Altered Andragogy: Lessons From Lockdown for Systems Engineering Education
45. A 0.82V supply and 23.4 ppm/0C current mirror assisted bandgap reference
46. Design, analysis and experimental verification of the self-resonant inverter for induction heating crucible melting furnace based on IGBTs connected in parallel
47. Efficient and flexible access control via Jones-optimal logic program specialisation
48. A Single BJT 10.2 ppm/0C Bandgap Reference in 45nm CMOS Technology
49. Development of an Obstacle Avoidance Robot
50. A two-stage opamp frequency compensation technique by splitting the 2nd stage
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.