Academic literature on the topic 'Critical applications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Critical applications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Critical applications"
Kazymyr, Volodymyr, Andrii Mokrohuz, and Mykola Moshel. "MINIMAL HTTP HEADER FOR TRAFFIC CRITICAL APPLICATIONS." TECHNICAL SCIENCES AND TECHNOLOG IES, no. 2(8) (2017): 123–28. http://dx.doi.org/10.25140/2411-5363-2017-2(8)-123-128.
Full textThackray, Richard, Peter F. Morris, and Ken Ridal. "Alloys for critical applications." Ironmaking & Steelmaking 37, no. 4 (May 2010): 242–50. http://dx.doi.org/10.1179/030192310x12628786049314.
Full textPadula, Marco, and Giuliana Rubbia Rinaldi. "Mission-critical web applications." Interactions 6, no. 4 (July 1999): 52–66. http://dx.doi.org/10.1145/306412.306435.
Full textSharma, Deepak, and Sohan Garg. "A critical study of fuzzy logic systems and its applications." International Journal of Trend in Scientific Research and Development Volume-1, Issue-1 (December 31, 2016): 56–58. http://dx.doi.org/10.31142/ijtsrd105.
Full textRedmill, Felix. "Computers in safety-critical applications." Computing & Control Engineering Journal 3, no. 4 (1992): 178. http://dx.doi.org/10.1049/cce:19920046.
Full textFetzer, Christof. "Building Critical Applications Using Microservices." IEEE Security & Privacy 14, no. 6 (November 2016): 86–89. http://dx.doi.org/10.1109/msp.2016.129.
Full textNina Santi and Nathalie Mitton. "A resource management survey for mission-critical and time-critical applications in multiaccess edge computing." ITU Journal on Future and Evolving Technologies 2, no. 2 (November 10, 2021): 61–80. http://dx.doi.org/10.52953/bqvo3992.
Full textSuryawanshi, Rajesh, Shubham Sutar, and Dr Sunita Jadhav. "Emergency Application for Emergency Services in Critical Condition." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 563–64. http://dx.doi.org/10.22214/ijraset.2022.47911.
Full textAxer, Philip, Jonas Diemer, Mircea Negrean, Maurice Sebastian, Simon Schliecker, and Rolf Ernst. "Mastering MPSoCs for Mixed-critical Applications." IPSJ Transactions on System LSI Design Methodology 4 (2011): 91–116. http://dx.doi.org/10.2197/ipsjtsldm.4.91.
Full textAl Dhoayan, Mohammed, Huda Alghamdi, and YaseenM Arabi. "Machine learning applications in critical care." Saudi Critical Care Journal 3, no. 1 (2019): 29. http://dx.doi.org/10.4103/2543-1854.259475.
Full textDissertations / Theses on the topic "Critical applications"
Wu, Weihang. "Architectural Reasoning for Safety Critical Software Applications." Thesis, University of York, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485150.
Full textHaylock, James Alexander. "Fault tolerant drives for safety critical applications." Thesis, University of Newcastle Upon Tyne, 1998. http://hdl.handle.net/10443/352.
Full textKurd, Zeshan. "Artificial neural networks in safety-critical applications." Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428472.
Full textVenugopalan, Vigneshwaran. "Supervisory wireless control for critical industrial applications." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/8501/.
Full textRohrmair, Gordon Thomas. "Use of CSP to verify security-critical applications." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433325.
Full textSchwager, Mac. "Towards verifiable adaptive control for safety critical applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32344.
Full textIncludes bibliographical references (p. 97-101).
To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to practical direct-adaptive control systems. The first tool is derived from an asymptotic analysis of the error dynamics of a direct adaptive controller and uncertain linear plant. The analysis yields a so called Reduced Linear Asymptotic System, which can be used for designing adaptive systems to meet transient specifications. The tool is demonstrated in two design examples from flight mechanics, and verified in numerical simulation. The second tool developed is an algorithm for direct-adaptive control of plants with magnitude saturation constraints on multiple inputs. The algorithm is a non-trivial extension of an existing technique for single input systems with saturation. Boundeness of all signals is proved for initial conditions in a compact region. In addition, the notion of a class of multi-dimensional saturation functions is introduced. The saturation compensation technique is demonstrated in numerical simulation. Finally, these tools are applied to design a direct-adaptive controller for a realistic multi-input aircraft model to accomplish control reconfiguration in the case of unforeseen failure, damage, or disturbances. A novel control design for incorporating control allocation and reconfiguration is introduced. The adaptive system is shown in numerical simulation to have favorable transient qualities and to give a stable response with input saturation constraints.
by Mac Schwager.
S.M.
Furht, Borko, David Joseph, David Gluch, and John Parker. "OPEN SYSTEMS FOR TIME-CRITICAL APPLICATIONS IN TELEMETRY." International Foundation for Telemetering, 1990. http://hdl.handle.net/10150/613465.
Full textIn this paper we discuss the next generation of open real-time systems for time critical applications in telemetry. Traditionally, real-time computing has been a realm of proprietary systems, with real-time applications written in assembly language. With the escalating cost of software development and the need for porting real-time applications to state-of-the-art hardware without massive conversion efforts, there is a need for real-time applications to be portable so that they can be moved to newer hardware platforms easily. Therefore, the next generation of real-time systems will be based on open systems incorporating industry standards, which will reduce system cost and time to market, increase availability of software packages, increase ease-of-use, and facilitate system integration. The open real-time system strategy, presented in this paper, is based on hardware architectures using off-the-shelf microprocessors, Motorola 680X0 and 88X00 families, and the REAL/IX operating system, a fully preemptive real-time UNIX operating system, developed by MODCOMP.
Bion, Julian Fleetwoo. "Severity scoring and its applications in critical illness." Thesis, Imperial College London, 1990. http://hdl.handle.net/10044/1/47775.
Full textJiang, Xiaolin. "Wireless Communication Networks for Time-critical Industrial Applications." Licentiate thesis, KTH, Nätverk och systemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239019.
Full textQC 20181116
Lu, Yu. "Probabilistic verification of satellite systems for mission critical applications." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7586/.
Full textBooks on the topic "Critical applications"
Avižienis, Algirdas, and Jean-Claude Laprie, eds. Dependable Computing for Critical Applications. Vienna: Springer Vienna, 1991. http://dx.doi.org/10.1007/978-3-7091-9123-1.
Full textAvižienis, Algirdas. Dependable Computing for Critical Applications. Vienna: Springer Vienna, 1991.
Find full textTelevision: Critical methods and applications. 3rd ed. Mahwah, N.J: Lawrence Erlbaum Associates, 2007.
Find full textAlgirdas, Avižienis, and Laprie J. C, eds. Dependable computing for critical applications. Wien: Springer-Verlag, 1991.
Find full textTelevision: Critical methods and applications. 4th ed. New York, NY: Routledge, 2011.
Find full textButler, Jeremy G. Television: Critical methods and applications. 2nd ed. Mahwah, N.J: Lawrence Erlbaum Associates, 2001.
Find full textButler, Jeremy G. Television: Critical methods and applications. Belmont, Calif: Wadsworth Publishing Company, 1994.
Find full textTelevision: Critical methods and applications. 2nd ed. Mahwah, N.J: Lawrence Erlbaum Associates, 2002.
Find full textCristian, Flaviu, Gerard Le Lann, and Teresa Lunt, eds. Dependable Computing for Critical Applications 4. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9.
Full textBook chapters on the topic "Critical applications"
Wolf, Marko. "Security-Critical Vehicular Applications." In Security Engineering for Vehicular IT Systems, 49–75. Wiesbaden: Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_4.
Full textHu, Xiaolong. "Filing Patent Applications." In Smoothing a Critical Transition, 87–100. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4035-6_8.
Full textRass, Stefan, Stefan Schauer, Sandra König, and Quanyan Zhu. "Critical Infrastructures." In Advanced Sciences and Technologies for Security Applications, 21–42. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46908-5_2.
Full textGiritli Nygren, Katarina, Anna Olofsson, and Susanna Öhman. "Methodological Applications." In Critical Studies in Risk and Uncertainty, 133–56. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33524-3_8.
Full textAstic, Isabelle, Coline Aunis, Jérome Dupire, Viviane Gal, Eric Gressier-Soudan, Christophe Pitrey, Matthieu Roy, et al. "Pervasive Games and Critical Applications." In Computer Science and Ambient Intelligence, 263–84. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118580974.ch12.
Full textBlieberger, Johann. "Loops for Safety Critical Applications." In Safe Comp 95, 269–82. London: Springer London, 1995. http://dx.doi.org/10.1007/978-1-4471-3054-3_19.
Full textKane, Robert L., and Gary G. Kay. "Computer Applications in Neuropsychological Assessment." In Critical Issues in Neuropsychology, 359–92. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4757-9820-3_11.
Full textMotreanu, D., and P. D. Panagiotopoulos. "Nonsmooth Critical Point Theory." In Nonconvex Optimization and Its Applications, 35–58. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-4064-9_2.
Full textHenkel, Malte. "Further Developments and Applications." In Conformal Invariance and Critical Phenomena, 219–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-662-03937-3_12.
Full textPurnell, Larry. "Critical Reflection." In Global Applications of Culturally Competent Health Care: Guidelines for Practice, 97–112. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69332-3_10.
Full textConference papers on the topic "Critical applications"
Guch, S., and Douglas P. Stanley. "Lasers for airborne applications." In Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.161581.
Full textCheng, Li-Jen, and Keung L. Luke. "Photorefractive semiconductors and applications." In Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.178621.
Full textBreckinridge, James B. "Advanced applications: an overview." In Critical Review Collection. SPIE, 1997. http://dx.doi.org/10.1117/12.279812.
Full textFeigelson, Robert S. "Optical materials for ultraviolet applications." In Critical Review Collection. SPIE, 1996. http://dx.doi.org/10.1117/12.245187.
Full textHalmos, Maurice J., and John H. S. Wang. "Laser radar systems and applications." In Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.161579.
Full textMcMurtrey, James E., Lawrence A. Corp, Moon S. Kim, Emmett W. Chappelle, Craig S. T. Daughtry, and J. D. DiBenedetto. "Fluorescence techniques in agricultural applications." In Critical Review Collection. SPIE, 2001. http://dx.doi.org/10.1117/12.420099.
Full textBell, Alan E. "Mass storage systems and applications." In Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.192213.
Full textHibbard, Douglas L. "Electroless nickel for optical applications." In Critical Review Collection. SPIE, 1997. http://dx.doi.org/10.1117/12.279806.
Full textHong, John H. "Applications of photorefractors for signal processing." In Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.178624.
Full textRaguin, Daniel H., Scott M. Norton, and G. Michael Morris. "Subwavelength structured surfaces and their applications." In Critical Review Collection. SPIE, 1993. http://dx.doi.org/10.1117/12.170186.
Full textReports on the topic "Critical applications"
Pham, H., and M. Pham. Software reliability models for critical applications. Office of Scientific and Technical Information (OSTI), December 1991. http://dx.doi.org/10.2172/10105800.
Full textPham, H., and M. Pham. Software reliability models for critical applications. Office of Scientific and Technical Information (OSTI), December 1991. http://dx.doi.org/10.2172/6017897.
Full textSrivastava, A. N., and T. C. Stauffer. Superconductor critical current standards for fusion applications. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.ir.5027.
Full textDavid Schwam, John Wallace, and Sebastian Birceanu. Die Materials for Critical Applications and Increased Production Rates. Office of Scientific and Technical Information (OSTI), November 2002. http://dx.doi.org/10.2172/806823.
Full textDellin, T. A. 1998 technology roadmap for integrated circuits used in critical applications. Office of Scientific and Technical Information (OSTI), September 1998. http://dx.doi.org/10.2172/296751.
Full textRenier, J., and C. Parks. Executive summary: Reactor critical benchmark calculations for burnup credit applications. Office of Scientific and Technical Information (OSTI), April 1990. http://dx.doi.org/10.2172/6882841.
Full textAlberts, Christopher, Audrey Dorofee, James Stevens, and Carol Woody. OCTAVE(Federal Registration)-S Implementation Guide, Version 1.0, Volume 7: Critical Asset Worksheets for Applications. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada430828.
Full textBonne, Susan M., and Jason K. Rupert. Use of Unified Modeling Language (UML) in Model-Based Development (MBD) For Safety-Critical Applications. Fort Belvoir, VA: Defense Technical Information Center, December 2014. http://dx.doi.org/10.21236/ada621409.
Full textMishchenko, Yuriy. Applications of Canonical transformations and nontrivial vacuum solutions to flavor mixing and critical phenomena in quantum field theory. Office of Scientific and Technical Information (OSTI), December 2004. http://dx.doi.org/10.2172/955491.
Full textLi, Lingxi, Yaobin Chen, Renren Tian, Feng Li, Howell Li, and James R. Sturdevant. An Integrated Critical Information Delivery Platform for Smart Segment Dissemination to Road Users. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317440.
Full text