Control

Results: 242548



#Item
51Identity management / Computer access control / Identity / Identity document / Namespace

Portable Identity OVERVIEW Portable Identity is the right and responsibility of each of us to create, control, and carry the important pieces of information that define who we are in a private, secure, and trusted manner

Add to Reading List

Source URL: www.globalid.net

Language: English - Date: 2018-05-23 15:04:09
52Computing / Network architecture / Routing protocols / Internet architecture / Data transmission / Internet Standards / Internet protocols / Routing algorithms / Routing / Link-state routing protocol / IS-IS / Open Shortest Path First

Central Control Over Distributed Routing http://fibbing.net Stefano Vissicchio∗, Olivier Tilmans∗, Laurent Vanbever†, Jennifer Rexford‡ ∗ ∗

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:56:11
53Computing / Network architecture / Routing protocols / Data transmission / Internet architecture / Internet Standards / Internet protocols / Routing / Open Shortest Path First / IS-IS / Link-state routing protocol / Computer network

Central Control Over Distributed Routing (Extended Version) http://fibbing.net Stefano Vissicchio∗, Olivier Tilmans∗, Laurent Vanbever†, Jennifer Rexford‡ ∗ ∗

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:56:03
54Physics / Accelerator physics / Experimental physics / Health / Medical physics / Radiation therapy / Fast neutron therapy / Neutron / Beamline / Cyclotron / Interlock / Therapy

CLINICAL NEUTRON THERAPY SYSTEM Control System Speci cation PART I: System Overview and Hardware Organization

Add to Reading List

Source URL: staff.washington.edu

Language: English - Date: 2015-02-13 17:05:51
55Theoretical computer science / Formal methods / Formal verification / Logic in computer science / Frappier / Electronic engineering

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Add to Reading List

Source URL: alloytools.org

Language: English - Date: 2018-06-13 06:07:43
56Software testing / Software engineering / Test suite / Test case / Code coverage / Test automation / Software requirements / NuSMV / Requirement / Reliability engineering

Automated Generation of Requirements-based Test Cases for an Adaptive Cruise Control System Adina Aniculaesei Falk Howar

Add to Reading List

Source URL: www.falkhowar.de

Language: English - Date: 2018-09-30 08:43:02
57Business models / Social programs / Market socialism / Housing cooperative / Real estate / Cooperative / The Co-operative Group / Economy / Consumers' co-operative / Radical Routes / Co-op Food / The Co-operative brand

RADICAL ROUTES Grassroots Control and Social Change How to set up a Housing Co-operative: Step-by-Step 1. Form a Group It all begins with a group of keen and eager people. Usually you’ll have something in common, bindi

Add to Reading List

Source URL: www.radicalroutes.org.uk

Language: English - Date: 2017-02-28 18:06:11
58Women's Islamic Games

Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) Errata Slip In the paper “Be Fast, Cheap and in Control with SwitchKV” by Xiaozhou Li and Raghav Sethi, Princeton

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
    59Computing / Network architecture / Emerging technologies / Information and communications technology / Configuration management / Software-defined networking / Ethernet / OpenFlow / Computer architecture / Access control / Computer network / Network interface controller

    Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 21:01:36
    60Ambient intelligence / Network performance / Internet of things / Computing / Technology / Information and communications technology / Distributed computing architecture / Networking hardware / Fog computing / Quality of service / Edge computing / Wireless sensor network

    EDGE COMPUTING FOR THE INTERNET OF THINGS Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay Katangur, Muhammad Khurram Khan, Min

    Add to Reading List

    Source URL: wirelesslab.sjtu.edu.cn

    Language: English - Date: 2018-08-22 21:38:24
    UPDATE