Sciweavers

1746 search results - page 348 / 350
» Residual for Component Specifications
Sort
View
TIT
2010
146views Education» more  TIT 2010»
13 years 2 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
TON
2010
161views more  TON 2010»
13 years 2 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 2 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
CHI
2011
ACM
12 years 11 months ago
Towards a design model for women's empowerment in the developing world
Pulitzer Prize-winning journalist Nicholas Kristof argues that “in this century the paramount moral challenge will be the struggle for gender equality around the world.” In th...
Geeta Shroff, Matthew Kam
IJACDT
2011
125views more  IJACDT 2011»
12 years 11 months ago
Becoming Creative through Self Observation: A (Second Order) Cybernetic Learning Strategy for the Metaverse
This study wishes to describe some of the key components of an art educational domain entitled ground<c>, which is being developed specifically for three dimensional online ...
Elif E. Ayiter