書名 | 作者 | 出版年 | 查看 | 回報錯誤連結 |
Machine learning for cyber physical systems:selected papers from the International Conference ML4CPS 2016 / |
Jurgen Beyerer, Oliver Niggemann, Christian Kuhnert. |
2017 |
查看
|
回報問題連結 |
Plug-and-play monitoring and performance optimization for industrial automation processes |
Hao Luo. |
2017 |
查看
|
回報問題連結 |
Secure ICT service provisioning for cloud, mobile and beyond:ESARIS: the answer to the demands of industrialized IT production balancing between buyers and providers / |
Eberhard von Faber, Wolfgang Behnsen. |
2017 |
查看
|
回報問題連結 |
Architectural transformations in network services and distributed systems |
Andriy Luntovskyy, Josef Spillner. |
2017 |
查看
|
回報問題連結 |
New methods to engineer and seamlessly reconfigure time triggered Ethernet based systems during runtime based on the PROFINET IRT example |
Lukasz Wisniewski. |
2017 |
查看
|
回報問題連結 |
Search engines for children:search user interfaces and information-seeking behaviour / |
Tatiana Gossen. |
2015 |
查看
|
回報問題連結 |
Compressive sensing for the photonic mixer device:fundamentals, methods and results / |
Miguel Heredia Conde. |
2017 |
查看
|
回報問題連結 |
Enhanced machine learning and data mining methods for analysing large hybrid electric vehicle fleets based on load spectrum data |
Philipp Bergmeir. |
2018 |
查看
|
回報問題連結 |
Projection-based clustering through self-organization and swarm intelligence:combining cluster analysis with the visualization of high-dimensional data / |
Michael Christoph Thrun. |
2018 |
查看
|
回報問題連結 |
Semantic applications:methodology, technology, corporate use / |
Thomas Hoppe, Bernhard Humm, Anatol Reibold. |
2018 |
查看
|
回報問題連結 |
A polynomial translation of mobile ambients into safe petri nets:understanding a calculus of hierarchical protection domains / |
Susanne Gobel. |
2016 |
查看
|
回報問題連結 |
Complete symbolic simulation of SystemC models:efficient formal verification of finite non-terminating programs / |
Vladimir Herdt. |
2016 |
查看
|
回報問題連結 |
Syndevs co-design flow:a hardware / software co-design flow based on the discrete event system specification model of computation / |
H. Gregor Molter. |
2012 |
查看
|
回報問題連結 |
Information flow based security control beyond RBAC:How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / |
Klaus-Peter Fischer-Hellmann. |
2012 |
查看
|
回報問題連結 |
ISSE 2012 securing electronic business processes:highlights of the Information Security Solutions Europe 2012 Conference / |
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider. |
2012 |
查看
|
回報問題連結 |
|