Skip to main content

and
  1. No Access

    Living Reference Work Entry In depth

    Machine Learning for Static Malware Analysis

    Malicious software (malware) is a term that describes any malicious program or code that is designed to impose harm or to steal information from systems. It includes various types such as viruses, worms, and T...

    Ziad Mansour, Christopher Molloy in Encyclopedia of Machine Learning and Data …

  2. No Access

    Living Reference Work Entry In depth

    Adversarial Learning on Malware

    With the cybersecurity systems’ growing dependence on machine learning models, it is important to understand how an individual, organization, or government may take advantage of, or deceive, these models. In o...

    Christopher Molloy, Ziad Mansour in Encyclopedia of Machine Learning and Data …

  3. No Access

    Reference Work Entry In depth

    Robust Fault Diagnosis and Control

    Aiming at increasing system reliability and availability, integration of fault diagnosis into feedback control systems, and integrated design of control and diagnosis receive considerable attention in research...

    Steven X. Ding in Encyclopedia of Systems and Control (2021)

  4. No Access

    Living Reference Work Entry In depth

    Robust Fault Diagnosis and Control

    Aiming at increasing system reliability and availability, integration of fault diagnosis into feedback control systems, and integrated design of control and diagnosis receive considerable attention in research...

    Steven X. Ding in Encyclopedia of Systems and Control

  5. No Access

    Reference Work Entry In depth

    FPGA Technology Map**

    Jason Cong, Yuzheng Ding in Encyclopedia of Algorithms (2016)

  6. No Access

    Reference Work Entry In depth

    Maximum Lifetime Coverage

    Weili Wu, Ling Ding in Encyclopedia of Algorithms (2016)

  7. No Access

    Reference Work Entry In depth

    Adaptive Partitions

    ** Deng, Weili Wu, Eugene Shragowitz, Ding-Zhu Du in Encyclopedia of Algorithms (2016)

  8. No Access

    Reference Work Entry In depth

    Probe Selection

    Wen Xu, Weili Wu, Ding-Zhu Du in Encyclopedia of Algorithms (2016)

  9. No Access

    Reference Work Entry In depth

    Connected Dominating Set

    Feng Wang, Ding-Zhu Du, **uzhen Cheng in Encyclopedia of Algorithms (2016)

  10. No Access

    Reference Work Entry In depth

    Robust Fault Diagnosis and Control

    Aiming at increasing system reliability and availability, integration of fault diagnosis into feedback control systems and integrated design of control and diagnosis receive considerable attention in research ...

    Steven X. Ding in Encyclopedia of Systems and Control (2015)

  11. No Access

    Living Reference Work Entry In depth

    FPGA Technology Map**

    Jason Cong, Yuzheng Ding in Encyclopedia of Algorithms

  12. No Access

    Living Reference Work Entry In depth

    Probe Selection

    Wen Xu, Weili Wu, Ding-Zhu Du in Encyclopedia of Algorithms

  13. No Access

    Living Reference Work Entry In depth

    Maximum Lifetime Coverage

    Weili Wu, Ling Ding in Encyclopedia of Algorithms

  14. No Access

    Living Reference Work Entry In depth

    Adaptive Partitions

    ** Deng, Weili Wu, Eugene Shragowitz, Ding-Zhu Du in Encyclopedia of Algorithms

  15. No Access

    Living Reference Work Entry In depth

    Connected Dominating Set

    Feng Wang, Ding-Zhu Du, **uzhen Cheng in Encyclopedia of Algorithms

  16. No Access

    Reference Work Entry In depth

    Semantic Web Search Engines

    The last couple of years have seen an increasing growth in the amount of Semantic Web data made available, and exploitable, on the Web. Compared to the Web, one unique feature of the Semantic Web is its friend...

    Dr. Mathieu d’Aquin, Li Ding, Enrico Motta in Handbook of Semantic Web Technologies (2011)

  17. No Access

    Reference Work Entry In depth

    FPGA Technology Map**

    Jason Cong, Yuzheng Ding in Encyclopedia of Algorithms (2008)

  18. No Access

    Reference Work Entry In depth

    Connected Dominating Set

    **uzhen Cheng, Feng Wang, Ding-Zhu Du in Encyclopedia of Algorithms (2008)