Stuart

Results: 5193



#Item
591

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems: Applied to Stuxnet Arash Nourian Stuart Madnick

Add to Reading List

Source URL: ic3.mit.edu

Language: English - Date: 2015-03-02 04:17:16
    592

    Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz Radu V. Balan

    Add to Reading List

    Source URL: www.math.umd.edu

    Language: English - Date: 2005-12-11 19:15:46
      593

      Alphabet Soup: Design and Development of a Short Form Game Dana Ruggiero, Stuart Moran, Charlie Drewitt, Jack Brady Bath Spa University Newton St. Loe, Bath United Kingdom

      Add to Reading List

      Source URL: fdg2014.org

      Language: English - Date: 2014-04-16 20:00:14
        594

        Title: Developing Enterprising STEM Graduates Case Study Author(s): Stuart Abbott and Neil Coles Department: Student Enterprise (Research and Commercial Division) Institution: Cardiff University Abstract: The core projec

        Add to Reading List

        Source URL: www.wimcs.ac.uk

        Language: English - Date: 2012-07-13 11:05:32
          595

          A Curriculum Guide to Spy Camp By Stuart Gibbs About the Book Ben Ripley is at it again! Ben plans to spend the summer hanging out with his best friend, Mike,

          Add to Reading List

          Source URL: d28hgpri8am2if.cloudfront.net

          Language: English - Date: 2013-09-26 07:00:59
            596

            Poetry and the Mystique of the Self in John Stuart Mill: Sources of Libertarian Socialism William D. Gairdner John Stuart Mill’s On Libertyis typically considered a carefully argued treatise on freedom deliver

            Add to Reading List

            Source URL: www.nhinet.org

            Language: English - Date: 2009-08-21 13:13:22
              597Computing / Computer security / Software / Computer network security / Cyberwarfare / Data security / Port scanner / Transmission Control Protocol / Firewall / Antivirus software / Cache / Bloom filter

              Very Fast Containment of Scanning Worms Nicholas Weaver ICSI Stuart Staniford Nevis Networks

              Add to Reading List

              Source URL: www1.icsi.berkeley.edu

              Language: English - Date: 2012-09-26 16:43:10
              598

              Learning Information Extraction Rules: An Inductive Logic Programming approach James Stuart Aitken Abstract. The objective of this work is to learn information extraction rules by applying Inductive Logic Programming (IL

              Add to Reading List

              Source URL: www.aiai.ed.ac.uk

              Language: English - Date: 2008-03-17 06:13:11
                599

                Using System Dynamics to Analyze the Effect of Funding Fluctuation on Software Development Travis Trammell Stuart Madnick Allen Moulton Working Paper CISL#

                Add to Reading List

                Source URL: ic3.mit.edu

                Language: English - Date: 2015-03-02 04:16:12
                  600

                  A Curriculum Guide to Belly Up and Poached By Stuart Gibbs About Belly Up Twelve-year-old Theodore “Teddy” Roosevelt Fitzroy has murder on his hands and trouble on

                  Add to Reading List

                  Source URL: d28hgpri8am2if.cloudfront.net

                  Language: English - Date: 2014-02-14 09:59:57
                    UPDATE