by
Kwan, Bing W.
Format:
Books
Excerpt:
Electronic handbook on communications for traffic control and intelligent transportation systems
by
Guyton, Joseph W.
Format:
Books
Excerpt:
Traffic control -- Electronic systems.
View Other Search Results
by
Weyns, Danny. editor.
Format:
Electronic Resources
Excerpt:
Traffic Control with Co-Fields -- Designing Self-organising MAS Environments: The Collective Sort Case.
by
Jones, Cliff B. editor.
Format:
Electronic Resources
Excerpt:
Domain-Oriented, Model-Based Approach for Construction and Verification of Railway Control Systems -- Compensable
by
Helbing, D. editor.
Format:
Electronic Resources
Excerpt:
Business -- Market Segmentation: The Network Approach -- Managing Autonomy and Control in Economic Systems
by
National Research Council (U.S.). Transportation Research Board.
Format:
Books
Excerpt:
simulator scenarios to study effectiveness of electronic stability control systems / Ginger S. Watson
by
Rettberg, Achim. editor.
Format:
Electronic Resources
Excerpt:
several electronic control devies, exchanging information through the network brings about more complex
by
Kowalik, Janusz S. editor.
Format:
Electronic Resources
Excerpt:
Secure Access Control -- Honeynets: Foundations for the Development of Early Warning Information Systems
by
Fisher, Dennis G., Ph. D.
Format:
Electronic Resources
Excerpt:
electronics, automotive electronics and traffic control. Includes an executive summary in each volume and
by
Soto, Maria.
Format:
Electronic Resources
Excerpt:
comfortable. In industry, embedded systems are used to manage and control complex systems (e.g. nuclear power
by
IFAC Symposium on Fault Detection, Supervision, and Safety for Technical Processes. (6th : 2006 : Beijing, China)
Format:
Electronic Resources
Excerpt:
fail-safe control -- Design measures for fault tolerance -- Reconfigurable and scalable control systems
by
Saglietti, Francesca. editor.
Format:
Electronic Resources
Excerpt:
-- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security
Limit Search Results