Academic literature on the topic 'Critical control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Critical control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Critical control"

1

Cullyer, John. "Safety-critical control systems." Computing & Control Engineering Journal 2, no. 5 (1991): 202. http://dx.doi.org/10.1049/cce:19910055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brewer, Ross. "Protecting critical control systems." Network Security 2012, no. 3 (March 2012): 7–10. http://dx.doi.org/10.1016/s1353-4858(12)70044-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dickinson, Don. "Protecting Critical Control Systems." Opflow 40, no. 8 (August 2014): 8–9. http://dx.doi.org/10.5991/opf.2014.40.0054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Hak-Jae, Tae-Wook Hahn, Ji-Hun Juong, Gyung-Jin Bahk, and Chong-Hae Hong. "Evaluation of Biological Critical Control Points Using Escherichia coli Genotyping." Korean Journal for Food Science of Animal Resources 29, no. 6 (December 31, 2009): 695–701. http://dx.doi.org/10.5851/kosfa.2009.29.6.695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clain, Jeremy. "Glucose control in critical care." World Journal of Diabetes 6, no. 9 (2015): 1082. http://dx.doi.org/10.4239/wjd.v6.i9.1082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schultz, Jack C., Manfred Mackauer, Lester E. Ehler, and Jens Roland. "Critical Issues in Biological Control." Ecology 72, no. 3 (June 1991): 1173. http://dx.doi.org/10.2307/1940620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shultz, Jack C. "Critical Issues in Biological Control?" Ecology 72, no. 3 (June 1991): 1173. http://dx.doi.org/10.2307/1940621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Preiser, Jean-Charles. "Glycemic control during critical illness." Expert Review of Endocrinology & Metabolism 6, no. 5 (September 2011): 681–88. http://dx.doi.org/10.1586/eem.11.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Afifi, Sherif. "Glycemic Control in Critical Care." International Anesthesiology Clinics 47, no. 1 (2009): 139–51. http://dx.doi.org/10.1097/aia.0b013e318194ffc6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Perks, Bob. "Critical perspectives in management control." British Accounting Review 22, no. 3 (September 1990): 290–91. http://dx.doi.org/10.1016/0890-8389(90)90012-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Critical control"

1

Misner, Scottie, and Carol Curtis. "HACCP - Hazard Analysis Critical Control Points." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2008. http://hdl.handle.net/10150/146434.

Full text
Abstract:
1p.
HACCP, pronounced has-up, is a food safety self-inspection system that combines up-to-date technical information with step-by-step procedures to evaluate and monitor the flow of food throughout a food establishment from receiving to service. This publication introduces this system to readers and outlines 6 simple HACCP principles to reduce the occurrence of food-borne illness at home.
APA, Harvard, Vancouver, ISO, and other styles
2

Åkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Full text
Abstract:

This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.

The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.

The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.

In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.

APA, Harvard, Vancouver, ISO, and other styles
3

Ifill, Wilson. "B annotations in critical control systems development." Thesis, University of Surrey, 2008. http://epubs.surrey.ac.uk/842966/.

Full text
Abstract:
The design and implementation of critical controllers benefit from development in a formal method such as B. However, B does not support execution specification directly, which is a requirement in controller design. The aim here is to develop a set of annotations so that they can be used by a B design engineer to capture execution requirements, while creating the B model. The annotations, once shown to be machine-annotation consistent with the B machine, can be used independently from the machine to assess the correctness of CSP controllers developed to detail the control behaviour. CSP-B is a formal method integration that can be used to develop critical controller with both state and event behaviour. The advantages of using annotations is that the execution requirements can be captured and shown to be machine-annotation consistent during state operation development, and that a control loop invariant does not have to be independently developed. Handel-C is used on route to hardware synthesis as it supports the implementation of concurrency and the manipulation of state. Annotations are utilised again to guide the translation of the B and control annotations into Handel-C. This PhD. work has three main aims. Firstly, to introduce a set of annotations to describe control directives to permit controller development in B. The annotations capture execution requirements. They give rise to proof obligations that when discharged prove that the annotations are machine-annotation consistent with the machine they are written in, and therefore will not cause the machine to diverge. Secondly, we have proven that CSP controllers that are consistent with the annotations will preserve the non-divergence property established between the machine and the annotations. Thirdly, we show how annotation refinement is possible, and show a range of mappings from the annotated B and the consistent controller to Handel-C. The development of mappings demonstrates the feasibility of automatic translation of annotated B to Handel-C.
APA, Harvard, Vancouver, ISO, and other styles
4

Binnie, Iona B. "Critical dimension control : influencing factors and measurement." Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/10815.

Full text
Abstract:
Advanced Lithography continues to be the limiting factor in the drive for higher levels of microcircuit integration. The key to the successful management of a lithography process is the integration of full measurement and instrumentation functions with the process, and the adoption of effective process control strategies. The aim of this research is to improve the understanding of critical dimension (CD) control by an investigation of the sources of variations in linewidth dimensions. Having identified the key factors, it should be possible to characterize and control their influence. Experimental analysis suggests that film thickness and photoresist thickness have a profound effect on linewidth dimensions. Simulation techniques are used to establish a theory which uses standing wave patterns within film stacks to predict reflectance and exposure threshold, as well as the dimensions of the developed resist images. This theory is later corroborated by measurements on test wafers. Having established the need to monitor film thickness variations, a novel metrology technique which incorporates both film thickness and linewidth uniformity measurements is introduced. The technique is based on the optical characteristics of a 'chequerboard' test pattern, consisting of clear and opaque squares. The chequerboard effectively enhances deviations in CD by translating changes in linewidth into an area change on the chequerboard. The technique was originally based on the measurement of light transmitted through glass wafers. The implementation of the technique using reflectance from silicon wafers is described, and possible future developments of the system are discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

Åkerberg, Johan. "On security in safety-critical process control /." Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Venugopalan, Vigneshwaran. "Supervisory wireless control for critical industrial applications." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/8501/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
APA, Harvard, Vancouver, ISO, and other styles
8

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
APA, Harvard, Vancouver, ISO, and other styles
9

Schwager, Mac. "Towards verifiable adaptive control for safety critical applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32344.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2005.
Includes bibliographical references (p. 97-101).
To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to practical direct-adaptive control systems. The first tool is derived from an asymptotic analysis of the error dynamics of a direct adaptive controller and uncertain linear plant. The analysis yields a so called Reduced Linear Asymptotic System, which can be used for designing adaptive systems to meet transient specifications. The tool is demonstrated in two design examples from flight mechanics, and verified in numerical simulation. The second tool developed is an algorithm for direct-adaptive control of plants with magnitude saturation constraints on multiple inputs. The algorithm is a non-trivial extension of an existing technique for single input systems with saturation. Boundeness of all signals is proved for initial conditions in a compact region. In addition, the notion of a class of multi-dimensional saturation functions is introduced. The saturation compensation technique is demonstrated in numerical simulation. Finally, these tools are applied to design a direct-adaptive controller for a realistic multi-input aircraft model to accomplish control reconfiguration in the case of unforeseen failure, damage, or disturbances. A novel control design for incorporating control allocation and reconfiguration is introduced. The adaptive system is shown in numerical simulation to have favorable transient qualities and to give a stable response with input saturation constraints.
by Mac Schwager.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
10

Lundahl, Kristoffer. "Modeling and Optimization for Critical Vehicle Maneuvers." Licentiate thesis, Linköpings universitet, Fordonssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-94010.

Full text
Abstract:
As development in sensor technology, situation awareness systems, and computational hardware for vehicle systems progress, an opportunity for more advanced and sophisticated vehicle safety-systems arises. With the increased level of available information---such as position on the road, road curvature and knowledge about surrounding obstacles---future systems could be seen utilizing more advanced controls, exploiting at-the-limit behavior of the vehicle. Having this in mind, optimization methods have emerged as a powerful tool for offline vehicle-performance evaluation, providing inspiration to new control strategies, and by direct implementation in on-board systems. This will, however, require a careful choice of modeling and objectives, since the solution to the optimization problem will rely on this. With emphasis on vehicle modeling for optimization-based maneuvering applications, a vehicle-dynamics testbed has been developed. Using this vehicle in a series of experiments, most extensively in a double lane-change maneuver, verified the functionality and capability of the equipment. Further, a comparative study was performed, considering vehicle models based on the single-track model, extended with, e.g., tire-force saturation, tire-force lag and roll dynamics. The ability to predict vehicle behavior was evaluated against measurement data from the vehicle testbed. A platform for solving vehicle-maneuvering optimization-problems has been developed, with state-of-the-art optimization tools, such as JModelica.org and Ipopt. This platform is utilized for studies concerning the influence different vehicle-model configurations have on the solution to critical maneuvering problems. In particular, different tire modeling approaches, as well as vehicle-chassis models of various complexity, are investigated. Also, the influence different road-surface conditions-e.g., asphalt, snow and ice-have on the solution to time-optimal maneuvers is studied. The results show that even for less complex models-such as a single-track model with a Magic Formula based tire-model-accurate predictions can be obtained when compared to measurement data. The general observation regarding vehicle modeling for the time-critical maneuvers is similar; even the least complex models can be seen to capture certain characteristics analogous to those of higher complexity. Analyzing the results from the optimization problems, it is seen that the overall dynamics, such as resultant forces and yaw moment, obtained for different model configurations, correlates very well. For different road surfaces, the solutions will of course differ due to the various levels of tire-forces being possible to realize. However, remarkably similar vehicle paths are obtained, regardless of surface. These are valuable observations, since they imply that models of less complexity could be utilized in future on-board optimization-algorithms, to generate, e.g., yaw moment and vehicle paths. In combination with additional information from enhanced situation-awareness systems, this enables more advanced safety-systems to be considered for future vehicles.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Critical control"

1

Chua, Wai Fong, Tony Lowe, and Tony Puxty, eds. Critical Perspectives in Management Control. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-07658-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manfred, Mackauer, Ehler Lester E, and Roland Jens, eds. Critical issues in biological control. Andover, Hants [England]: Intercept, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fong, Chua Wai, Lowe Tony, and Puxty Anthony, eds. Critical perspectives in management control. Basingstoke: Macmillan, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1955-, Chua Wai Fong, Lowe Tony, and Puxty Anthony G, eds. Critical perspectives in management control. Basingstoke: Macmillan, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chua, Waifong. Critical perspectives in management control. Basingstoke: Macmillan, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manfred, Mackauer, Ehler Lester E, and Roland Jens, eds. Critical issues in biological control. Andover: Intercept, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, Nanette J. Social control of deviance: A critical perspective. New York: McGraw-Hill Pub. Co., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

K, Mumby Dennis, ed. Narrative and social control: Critical perspectives. Newbury Park [Calif.]: Sage Publications, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mumby, Dennis. Narrative and Social Control: Critical Perspectives. 2455 Teller Road, Thousand Oaks California 91320 United States: SAGE Publications, Inc., 1993. http://dx.doi.org/10.4135/9781483345277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gordon, Belcher, McIver Duncan E, Szalai Kenneth J, and Advisory Group for Aerospace Research and Development. Guidance and Control Panel. Working Group 09., eds. Validation of flight critical control systems. Neuilly sur Seine: Agard, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Critical control"

1

Cohen, Max, and Calin Belta. "Safety-Critical Control." In Adaptive and Learning-Based Control of Safety-Critical Systems, 29–56. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29310-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hudak-Roos, Martha, and E. Spencer Garrett. "Monitoring Critical Control Point Critical Limits." In HACCP, 62–71. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-8818-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hudak-Roos, Martha, and E. Spencer Garrett. "Monitoring Critical Control Point Critical Limits." In HACCP, 62–71. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-6542-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Novillo, Ernesto. "Critical Velocity of Turbomachines." In Vibration Control Engineering, 125–43. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003175230-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Humber, John. "Control Points and Critical Control Points." In HACCP, 97–104. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-8818-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Humber, John. "Control Points and Critical Control Points." In HACCP, 97–104. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-6542-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sperber, William H. "Determining Critical Control Points." In HACCP, 39–49. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-8818-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Krishnan, Armin. "Critical Loss of Control." In Why Paramilitary Operations Fail, 133–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71631-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sperber, William H. "Determining Critical Control Points." In HACCP, 39–49. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-6542-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cohen, Max, and Calin Belta. "Adaptive Safety-Critical Control." In Adaptive and Learning-Based Control of Safety-Critical Systems, 77–94. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29310-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Critical control"

1

Hannemann-Mantalas, Lynda C., and Harry J. Levinson. "Semiconductor process control." In Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.187456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

van Bezooijen, Roelof W. H. "Star sensors for autonomous attitude control and navigation." In Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.161586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gershbock, Richard. "Image acquisition: quality control for document image scanners." In Critical Review Collection. SPIE, 1991. http://dx.doi.org/10.1117/12.48889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bezdek, James C. "Pattern recognition, neural networks, fuzzy control: what's next?" In Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.171190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duncan, William. "Combined arms command and control (CAC2): advanced technology demonstration (ATD)." In Critical Review Collection. SPIE, 1995. http://dx.doi.org/10.1117/12.205531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marshall, Lawrence, Martin Weaver, William T. Thodos, and Bradley W. Schilling. "Integrated sight modules: fire control technology for the 21st century." In Critical Review Collection. SPIE, 1995. http://dx.doi.org/10.1117/12.205539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kuo, Sen M. "Adaptive active noise control systems: algorithms and digital signal processing (DSP) implementations." In Critical Review Collection. SPIE, 1995. http://dx.doi.org/10.1117/12.204209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Buchman, T. "Control theories in critical illness and critical care." In 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). IEEE, 2004. http://dx.doi.org/10.1109/cdc.2004.1428582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Buchman, T. "Control theories in critical illness and critical care." In 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). IEEE, 2004. http://dx.doi.org/10.1109/cdc.2004.1429197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Buchman, T. "Control theories in critical illness and critical care." In 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). IEEE, 2004. http://dx.doi.org/10.1109/cdc.2004.1429480.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Critical control"

1

Stilwell, Daniel J., Michel Pleimling, and Uwe C. Tauber. Toward Control of Universal Scaling in Critical Dynamics. Fort Belvoir, VA: Defense Technical Information Center, January 2016. http://dx.doi.org/10.21236/ad1008825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Musliner, David J., Robert P. Goldman, Michael J. Pelican, Kurt D. Krebsbach, and Edmund H. Dunfee. SA-CIRCA: Self-Adaptive Control for Mission-Critical Systems. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Freeman, Jared T., and Daniel Serfaty. Team Collaboration for Command and Control: A Critical Thinking Model. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada458622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Noble, David. High Leverage Command and Control Functions with Critical Human Roles. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada461212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Babcock, Wade, and Jerome Persh. Safeguarding America's Critical Technologies (and Avoiding Personal Risk) An Introduction to Export Control and Critical Technology Restrictions. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada406354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boren, Dale W. Management of Test Complexity for Emerging Safety Critical Control Systems Program. Fort Belvoir, VA: Defense Technical Information Center, May 2006. http://dx.doi.org/10.21236/ada455899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Musliner, David J., Robert P. Goldman, Michael J. Pelican, and Kurt D. Drebsbach. MASA-CIRCA: Multi-Agent Self-Adaptive Control for Mission-Critical Systems. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada421747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shih, Tsung-Ming A., Steven M. Duniho, and John H. McDonough. Control of Nerve Agent-Induced Seizures is Critical for Neuroprotection and Survival. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada417799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wilson, Patrick, L. D. Stephenson, and Ashok Kumar. Critical Evaluation of Lock Automation and Control Equipment at Corps-Operated Navigation Locks. Fort Belvoir, VA: Defense Technical Information Center, July 2001. http://dx.doi.org/10.21236/ada397446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wilson, Patrick, L. D. Stephenson, and Ashok Kumar. Critical Evaluation of Lock Automation and Control Equipment at Corps-Operated Navigation Locks. Fort Belvoir, VA: Defense Technical Information Center, September 2000. http://dx.doi.org/10.21236/ada383865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography