Search alternatives:
source » sources (Expand Search)
Showing 2,381 - 2,400 results of 8,692 for search 'source based view', query time: 0.22s Refine Results
  1. 2381
  2. 2382
  3. 2383
  4. 2384
  5. 2385
  6. 2386
  7. 2387
  8. 2388

    The Yücel Organization’s Perceptions of Yugoslavia and Turkey Following the 1953 Migration: The Notions of Home and of Fatherland by Berrin Çalışkan

    Published 2014-12-01
    “…This study is a social memory project that deals with Yücelcis’ perceptions of Yugoslavia by viewing the social impacts of the Yücel Incident in Macedonian Turkish society as a movement, which emerged in socialist Yugoslavia. …”
    Get full text
    Article
  9. 2389
  10. 2390
  11. 2391
  12. 2392

    ChaordicLedger: Knowledge Transfer for Industry by Michael F. Marchini

    Published 2023-01-01
    “…Instead, a permissioned, distributed knowledgebase that avoids vendor lock-in enables a consistent, real-time view of information that provides equivalent context for developers and other stakeholders. …”
    Get full text
    Article
  13. 2393
  14. 2394
  15. 2395
  16. 2396
  17. 2397

    Deterministic local multi-point fault detection method for industrial control topology by Ruozhou LIANG, Xibin ZHAO, Hai WAN

    Published 2021-10-01
    “…In view of the fact that the existing network fault detection algorithms cannot meet the four requirements of determination of detection time, low detection overhead, multi-point fault detection ability and topology adaptability of industrial control network at the same time, a multi-point fault detection method of time sensitive network based on Boolean network mapping was proposed.The method was divided into offline preparation phase and online detection phase.In the offline preparation phase, the detection flow generation algorithm generated a set of detection flows based on the network topology.The detection flow set covered the edges of the network topology.In the online detection phase, the detection packet was sent periodically from the source node to the controller according to the predefined path.Then, the controller inferred the failed link according to the arrival state of each detection packet.The experimental results show that, compared with the existing methods, the proposed method can accurately identify multiple failed links in a certain time, and generate fewer detection path sets to meet the above four requirements.…”
    Get full text
    Article
  18. 2398
  19. 2399
  20. 2400