43 results on '"Gordon A. Manson"'
Search Results
2. A Novel Environment-Aware Mobility Model for Mobile Ad Hoc Networks.
3. Using Security Attack Scenarios to Analyse Security During Information Systems Design.
4. UMAS Learning Requirement for Controlling Network Resources.
5. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.
6. Analysing Security Requirements of Information Systems Using Tropos.
7. Multi-agent Systems and Security Requirements Analysis.
8. An Ontology for Modelling Security: The Tropos Approach.
9. Modelling secure multiagent systems.
10. Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML.
11. Capacity assignment on asymmetric Bluetooth link.
12. A simulation design for link connection-oriented wireless mesh networks.
13. Class based selective-ARQ scheme for high performance TCP and UDP over wireless links.
14. Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware.
15. When security meets software engineering: a case of modelling secure information systems.
16. Networks security measures using neuro-fuzzy agents.
17. A Novel Agent-Based System to Support the Single Assessment Process of Older People.
18. Analysis and Design of the eSAP: An Integrated Health and Social Care Information System.
19. An intelligent approach to prevent distributed systems attacks.
20. Parallel Text Searching in Serial Files Using a Processor Farm.
21. Using Tropos Methodology to Model an Integrated Health Assessment System.
22. Design and code derivation in the PCSC methodology.
23. Experiments with a transputer-based parallel graph reduction machine.
24. Nearest-neighbour Searching in Files of Text Signatures Using Transputer Networks.
25. Divide-and-conquer and parallel graph reduction.
26. Network design for the implementation of text searching using a multicomputer.
27. Evaluation of Intelligent Intrusion Detection Models.
28. Lattice and ring array topologies using transputers.
29. Chemical graph matching using transputer networks.
30. Computer storage and retrieval of generic chemical structures in patents. 7. Parallel simulation of a relaxation algorithm for chemical substructure search.
31. Efficiency of text scanning in bibliographic databases using microprocessor-based, multiprocessor networks.
32. Divide-and-Conquer and parallel graph reduction
33. Searching of chemical structure data bases with parallel computer hardware
34. Study on Environment Mobility Models for Mobile Ad Hoc Network: Hotspot Mobility Model and Route Mobility Model
35. Capacity assignment on asymmetric Bluetooth link
36. Enhancing Bluetooth scheduler with predictive link capacity assignment plus multi-slot framing
37. A simulation design for link connection-oriented wireless mesh networks
38. Class based selective-ARQ scheme for high performance TCP and UDP over wireless links
39. Towards a Self-Healing Network in Controlling Access to Network Applications
40. Core objects required for a generic CASE repository
41. Transputer implementations of chemical substructure searching algorithms
42. Chemical database processing using parallel computer hardware
43. An ontology for modelling security: The tropos approach
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.