電子書書目整合查詢結果

總筆數:21

 
書名作者出版年查看回報錯誤連結
Machine learning for cyber physical systems:selected papers from the International Conference ML4CPS 2016 / Jurgen Beyerer, Oliver Niggemann, Christian Kuhnert. 2017 查看
回報問題連結
Plug-and-play monitoring and performance optimization for industrial automation processes Hao Luo. 2017 查看
回報問題連結
Secure ICT service provisioning for cloud, mobile and beyond:ESARIS: the answer to the demands of industrialized IT production balancing between buyers and providers / Eberhard von Faber, Wolfgang Behnsen. 2017 查看
回報問題連結
Architectural transformations in network services and distributed systems Andriy Luntovskyy, Josef Spillner. 2017 查看
回報問題連結
New methods to engineer and seamlessly reconfigure time triggered Ethernet based systems during runtime based on the PROFINET IRT example Lukasz Wisniewski. 2017 查看
回報問題連結
Search engines for children:search user interfaces and information-seeking behaviour / Tatiana Gossen. 2015 查看
回報問題連結
Compressive sensing for the photonic mixer device:fundamentals, methods and results / Miguel Heredia Conde. 2017 查看
回報問題連結
Enhanced machine learning and data mining methods for analysing large hybrid electric vehicle fleets based on load spectrum data Philipp Bergmeir. 2018 查看
回報問題連結
Projection-based clustering through self-organization and swarm intelligence:combining cluster analysis with the visualization of high-dimensional data / Michael Christoph Thrun. 2018 查看
回報問題連結
Semantic applications:methodology, technology, corporate use / Thomas Hoppe, Bernhard Humm, Anatol Reibold. 2018 查看
回報問題連結
A polynomial translation of mobile ambients into safe petri nets:understanding a calculus of hierarchical protection domains / Susanne Gobel. 2016 查看
回報問題連結
Complete symbolic simulation of SystemC models:efficient formal verification of finite non-terminating programs / Vladimir Herdt. 2016 查看
回報問題連結
Syndevs co-design flow:a hardware / software co-design flow based on the discrete event system specification model of computation / H. Gregor Molter. 2012 查看
回報問題連結
Information flow based security control beyond RBAC:How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / Klaus-Peter Fischer-Hellmann. 2012 查看
回報問題連結
ISSE 2012 securing electronic business processes:highlights of the Information Security Solutions Europe 2012 Conference / Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider. 2012 查看
回報問題連結
上一頁 第1頁/共2頁/跳至 下一頁