Many impact studies require climate change information at a finer resolution than that provided by Global Climate Models (GCMs). In the last 10 years, downscaling techniques, both...
Masoud Hessami, Philippe Gachon, Taha B. M. J. Oua...
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
Typhoon inflicts terrible damage due to thunderstorms, violent winds, torrential rain, flooding and extreme high tides. Improving the early typhoon forecast capability is important...
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...