The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
Abstract— Cognitive control - the ability to produce appropriate behavior in complex situations - is a fundamental aspect of intelligence. It is increasingly evident that this co...
—A novel feed-forward pulse width modulation (FF-PWM) technique is proposed for improving line regulation of buck or boost (BOB) converters. In order to provide a regulated suppl...
Wireless sensor network (WSN) applications have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that have small size and...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
Abstract— Datacasting employs the excess bandwidth from digital television signals for use in one-way data transmission, and it is being used successfully for high-speed download...
Kent Chamberlin, Scott Valcourt, Andrew Kun, Benja...