Flow control

Results: 3353



#Item
541Nuclear safety / Light water reactors / Actinides / Nuclear chemistry / Pressurized water reactor / Control rod / Nuclear fuel / Nuclear reactor / Neutron poison / Nuclear physics / Nuclear technology / Energy

Reactivity Initiated Accident Analysis of the HPLWR Three Pass Core with Ascending Gap Flow Using the KIKO3D-ATHLET Code György Hegyi, András Keresztúri, Csaba Maráczy, István Trosztel MTA KFKI Atomic Energy Researc

Add to Reading List

Source URL: www.djs.si

Language: English - Date: 2011-10-07 07:09:19
542Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
543Control engineering / Festo / Industrial control system / Control system / Control theory / Distributed control system / Packaging and labeling / Technology / Automation / Science

Learning System for Automation and Communications Process Control System Control of temperature, flow and filling level

Add to Reading List

Source URL: www.pacontrol.com

Language: English - Date: 2008-03-17 10:18:36
544Automation / Traffic congestion / Traffic flow / Platoon / Traffic / Autonomous car / Cruise control / Vehicular communication systems / Driving simulator / Transport / Land transport / Road transport

Microsoft Word - Towards Safe and Efficient Driver through Vehicle Automation_final

Add to Reading List

Source URL: davi.connekt.nl

Language: English - Date: 2013-11-12 04:34:44
545Advantage / Control theory / Adversary / Password / Algorithm / Computer science / Applied mathematics / Analysis of algorithms / Mathematics

Quantifying Information Flow for Dynamic Secrets Piotr Mardziel,† Mário S. Alvim,‡ Michael Hicks,† and Michael R. Clarkson∗ University of Maryland, College Park Universidade Federal de Minas Gerais ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
546Universal Serial Bus / Bus / Fibex / Hardware-in-the-loop simulation / FlexRay / INCA / Computer networks / CANape / Computer hardware / Computing / Embedded systems

Engineering Data flow transparency Rapid developments continue to challenge electronic control units in the automotive industry. This fact must be taken into account by Hardware-in-the-Loop systems.

Add to Reading List

Source URL: v2.can-newsletter.org

Language: English
547Control flow / Continuations / Procedural programming languages / Functional programming / Delimited continuation / Eval / Continuation-passing style / Continuation / Standard ML / Software engineering / Computing / Computer programming

BRICS Basic Research in Computer Science BRICS RSBiernacka et al.: An Operational Foundation for Delimited Continuations An Operational Foundation for

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2004-01-23 08:27:09
548Road safety / Operations research / Actuarial science / Risk management / Road traffic control / Traffic flow / Multi-criteria decision analysis / Risk / Simulation / Transport / Land transport / Road transport

Transport Research Arena 2014, Paris The STARs evaluation tool: optimising network performance, road worker safety and road user safety during roadworks and maintenance Jill Weekleya*, Nora Ni Nuallainb, Renaud Sarrazin

Add to Reading List

Source URL: tra2014.traconference.eu

Language: English - Date: 2015-01-12 09:16:19
549Mathematical physics / Mathematical modeling / Microscopic traffic flow model / Traffic flow / Fictitious force / Laplace transform / Acceleration / Control theory / Damping / Physics / Mathematical analysis / Road transport

CAR FOLLOWING MODELS BY RICHARD W. ROTHERY6

Add to Reading List

Source URL: tft.ceng.calpoly.edu

Language: English - Date: 2008-04-27 04:55:45
550Physical Unclonable Function / Randomness / Analysis of algorithms / Challenge-response authentication / IP / Control flow graph / PUF / Pseudorandomness / Copy protection / Cryptography / Applied mathematics / Theoretical computer science

A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-06-05 18:18:00
UPDATE