Listar por título
Mostrando ítems 6707-6726 de 245837
-
A section of the landscapes of the Mediterranean along the route of a thread of water: from the Pre-Pyrenees, inland, to the edges and coasts of delta de l'Ebre, Ribera del Xúquer, the Islands, and offshore to Venice
(LetteraVentidue, 2022-10-27)
Capítulo de libro
Acceso restringido por política de la editorialThis book is an open and potentially infinite interdisciplinary atlas of Mediterranean Routes: systems of material or immaterial relationships that somehow leave a trace in the landscape. The Open Atlas aims to put them ... -
A secure broadcast service for LDACS with an application to secure GBAS
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Texto en actas de congreso
Acceso abiertoThe VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and ... -
A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers
(Springer, 2015)
Capítulo de libro
Acceso restringido por política de la editorial -
A secure communication system based on a modified chaotic chua oscillator
(2014)
Comunicación de congreso
Acceso abiertoIn this paper we propose a new scheme for secure communications us- ing a modified Chua oscillator. A modification of the oscillator is proposed in order to facilitate the decryption. The communication system requires two ... -
A secure dual-layer fault protection strategy for distribution network with DERs: enhancing security in the face of communication challenges
(Multidisciplinary Digital Publishing Institute (MDPI), 2024-02-01)
Artículo
Acceso abiertoEarlier protection methods mainly focused on using communication channels to transmit trip signals between the protective devices (PDs), with no solutions provided in the case of communication failure. Therefore, this paper ... -
A secure JXTA-overlay platform for robot control
(Institute of Electrical and Electronics Engineers (IEEE), 2010)
Texto en actas de congreso
Acceso abiertoDue to the improvement of connections capabilities of end-devices there is an increasing interest to design and implement full featured P2P networks that integrate end-devices. In this paper, we use JXTA-Overlay for the ... -
A secure vault setup for a crypto wallet
(Universitat Politècnica de Catalunya, 2022-10-27)
Projecte Final de Màster Oficial
Acceso abiertoIn today's digital world, every user needs to store sensitive data, including personal information, cryptographic keys and/or passwords. For user convenience, this data is usually backed up on a cloud hosting so that users ... -
A security framework for JXTA-overlay
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Texto en actas de congreso
Acceso abiertoAt present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ... -
A security model for randomization-based protected caches
(2022)
Artículo
Acceso abiertoCache side-channel attacks allow adversaries to learn sensitive information about co-running processes by using only access latency measures and cache contention. This vulnerability has been shown to lead to several ... -
A security-aware approach to JXTA-overlay primitives
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Texto en actas de congreso
Acceso abiertoThe JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ... -
A segmentation algorithm based on acoustical features using a self organizing neural network.
(. EUROSPEECH, 1993)
Texto en actas de congreso
Acceso abiertoIn this paper we investigate the use of a self-organizing map in an acoustic segmentation task. The aim is to obtain a limited number of acoustic classes and to segment whenever a change in the class between two adjacent ... -
A segmentation-based coding system allowing manipulation of objects (sesame)
(IEEE, 1996)
Texto en actas de congreso
Acceso abiertoWe present a coding scheme that achieves, for each image in the sequence, the best segmentation in terms of rate-distortion theory. It is obtained from a set of initial regions and a set of available coding techniques. The ... -
A segmented total energy detector (sTED) optimized for (n, ¿) cross-section measurements at n_TOF EAR2
(Elsevier, 2024-04-01)
Artículo
Acceso abiertoThe neutron time-of-flight facility n_TOF at CERN is a spallation source dedicated to measurements of neutron- induced reaction cross-sections of interest in nuclear technologies, astrophysics, and other applications. Since ... -
A segregação planejada: o plano de modernização de Teresina
(Departament d'Urbanisme i Ordenació del Territori. Universitat Politècnica de Catalunya / Instituto del Conourbano. Universidad Nacional General Sarmiento / Instituto de Arte Americano. Universidad de Buenos Aires, 2013-06)
Texto en actas de congreso
Acceso abiertoA cidade de Teresina, fundada em 1852, com o traçado inicial planejado pelo governo da Província já para tornar-se capital do Piauí, restringia-se inicialmente ao bairro que hoje é denominado de Centro. Atualmente, a ... -
A selection of lessons learned from phase C/D of CubeSat projects of the Fly Your Satellite! programme
(Universitat Politècnica de Catalunya, 2022-04-29)
Comunicación de congreso
Acceso abiertoFly Your Satellite!” (FYS) is a recurring programme part of ESA Academy’s portfolio of “hands-on” activities. The programme was established to support University student teams in the development of their own CubeSat missions ... -
A selective logging mechanism for hardware transactional memory systems
(2011-09-19)
Report de investigación
Acceso abiertoLog-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative ... -
A self organizing feature map based on the fisher discriminant
(1994)
Texto en actas de congreso
Acceso abiertoIn this paper we propose a modification of the Self Organising map, where we is train the units using a transformation related to the Fisher Discriminant, in order to maximise the discrimination between units. The algorithm ... -
A self-adaptive hardware architecture with fault tolerance capabilities
(2013-12-09)
Artículo
Acceso restringido por política de la editorialThis paper describes a Fault Tolerance System (FTS) implemented in a new self-adaptive hardware architecture. This architecture is based on an array of cells that implements in a distributed way self-adaptive capabilities. ... -
A self-adaptive strategy for the time integration of navier-stokes equations
(2011-08)
Artículo
Acceso restringido por política de la editorialAn efficient self-adaptive strategy for the explicit time integration of Navier-Stokes equations is presented. Unlike the conventional explicit integration schemes, it is not based on a standard CFL condition. Instead, the ... -
A self-branched lamination of hierarchical patronite nanoarchitectures on carbon fiber cloth as novel electrode for ionic liquid electrolyte-based high energy density supercapacitors
(2019-11-14)
Artículo
Acceso abiertoThe developments of rationally designed binder-free metal chalcogenides decorated flexible electrodes are of paramount importance for advanced energy storage devices. Herein, binder-free patronite (VS4) flower-like ...