Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
8658
search results - page 79 / 1732
»
Models of Command and Control
Sort
relevance
views
votes
recent
update
View
thumb
title
10
click to vote
CDC
2009
IEEE
88
views
Control Systems
»
more
CDC 2009
»
A first principle model for multiphase slugging flow in vertical risers
14 years 17 days ago
Download
cas.ensmp.fr
Florent Di Meglio, Glenn-Ole Kaasa, Nicolas Petit
claim paper
Read More »
24
click to vote
RTSS
1993
IEEE
128
views
Control Systems
»
more
RTSS 1993
»
Symbolic Model Checking for Event-Driven Real-Time Systems
13 years 12 months ago
Download
cc.ee.ntu.edu.tw
Jin Yang, Aloysius K. Mok, Farn Wang
claim paper
Read More »
26
click to vote
RTSS
1995
IEEE
85
views
Control Systems
»
more
RTSS 1995
»
Efficient Microarchitecture Modeling and Path Analysis for Real-Time Software
13 years 11 months ago
Download
www.csee.umbc.edu
Yau-Tsun Steven Li, Sharad Malik, Andrew Wolfe
claim paper
Read More »
20
click to vote
CDC
2009
IEEE
106
views
Control Systems
»
more
CDC 2009
»
ILC applied to a flexible two-link robot model using sensor-fusion-based estimates
13 years 5 months ago
Download
www.control.isy.liu.se
Johanna Wallen, Svante Gunnarsson, Robert Henrikss...
claim paper
Read More »
27
click to vote
ISSA
2004
141
views
Information Technology
»
more
ISSA 2004
»
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
13 years 9 months ago
Download
icsa.cs.up.ac.za
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
claim paper
Read More »
« Prev
« First
page 79 / 1732
Last »
Next »