Zobrazeno 1 - 10
of 131
pro vyhledávání: '"David Kendall"'
Publikováno v:
IEEE Access, Vol 6, Pp 34884-34895 (2018)
In the practical study of cybersecurity, students benefit greatly from having a full control of physical equipment and services. However, this presents far too great a risk to security to be permitted on university campus networks. This paper describ
Externí odkaz:
https://doaj.org/article/c3bbb5eb57c04c7ca77d2e6811302bd5
Publikováno v:
IEEE Access, Vol 6, Pp 63258-63267 (2018)
There are many metrics defined for the analysis of swarm coordination algorithms. These metrics are usually based upon the distances between agents, the distance between agents and a fixed point, or the resultant vectors that potential field effects
Externí odkaz:
https://doaj.org/article/1590c015490847428c9434a4c0e3963d
Autor:
Gérard Brachet, David Kendall
Publikováno v:
Air and Space Law. 48:1-12
The United Nations Committee on the Peaceful Uses of Outer Space (UN COPUOS) has an impressive record of being in the vanguard for over sixty years in leading the development of multilateral treaties, principles, guidelines and best practices to assi
Autor:
David Kendall
Publikováno v:
Visual Studies. 37:213-217
Publikováno v:
Expert Systems with Applications. 227:120183
Autor:
David Kendall
Publikováno v:
Assessment and Development Matters. 13:42-44
Autor:
Tadej Battelino, Timothy Bailey, Ramin Tehranchi, Leslie Klaff, Thomas R. Pieber, Ulrike Hövelman, Leona Plum-Mörschel, Anita E. Melgaard, Ronnie Aronson, Linda A. DiMeglio, Thomas Danne, David Kendall
Publikováno v:
Metabolism. 128:155043
Autor:
Tadej Battelino, Timothy Bailey, Ramin Tehranchi, Leslie Klaff, Thomas R. Pieber, Ulrike Hövelmann, Leona Plum-Mörschel, Anita E. Melgaard, Ronnie Aronson, Linda A. DiMeglio, Thomas Danne, Anne Peters, David Kendall
Publikováno v:
Metabolism. 128:155044
Publikováno v:
IEEE Access, Vol 6, Pp 34884-34895 (2018)
In the practical study of cybersecurity, students benefit greatly from having a full control of physical equipment and services. However, this presents far too great a risk to security to be permitted on university campus networks. This paper describ