Exploració per títol
Ara es mostren els items 6679-6698 de 244456
-
A second opinion approach for speech recognition verification
(M,I, Torres & A. Sanfeliu / AERFAI, 1999)
Text en actes de congrés
Accés obertIn order to improve the reliability of speech recognition results, a verifying system, that takes profit of the information given from an alternative recognition step is proposed. The alternative results are considered as ... -
A second order cone formulation of continuous CTA model
(Springer, 2016)
Text en actes de congrés
Accés obertIn this paper we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statistical disclosure limitation (control) of tabular data. The goal of the CTA model is to find the closest safe table to some ... -
A Second Order Expansion of the Separatrix Map for Trigonometric Perturbations of a Priori Unstable Systems
(2016-11-01)
Article
Accés obertIn this paper we study a so-called separatrix map introduced by Zaslavskii–Filonenko (Sov Phys JETP 27:851–857, 1968) and studied by Treschev (Physica D 116(1–2):21–43, 1998; J Nonlinear Sci 12(1):27–58, 2002), Piftankin ... -
A Second-order delta-sigma control of dielectric charge for contactless capacitive MEMS
(2015-04-01)
Article
Accés obertThis letter introduces a new second-order delta-sigma method for controlling the dielectric charge in contactless capacitive microelectromechanical systems. This method improves the one previously proposed by the authors, ... -
A second-order distributed Trotter–Suzuki solver with a hybrid CPU–GPU kernel
(Elsevier, 2013-04)
Article
Accés obertThe Trotter-Suzuki approximation leads to an efficient algorithm for solving the timedependent Schrödinger equation. Using existing highly optimized CPU and GPU kernels, we developed a distributed version of the algorithm ... -
A second-order face-centred finite volume method for elliptic problems
(2020-01-01)
Article
Accés obertA second-order face-centred finite volume method (FCFV) is proposed. Contrary to the more popular cell-centred and vertex-centred finite volume (FV) techniques, the proposed method defines the solution on the faces of the ... -
A second-order face-centred finite volume method on general meshes with automatic mesh adaptation
(2020-01-01)
Article
Accés obertA second-order face-centred finite volume strategy on general meshes is pro-posed. The method uses a mixed formulation in which a constant approximationof the unknown is computed on the faces of the mesh. Such information ... -
A second-order joint Eisner model for syntactic and semantic dependency parsing
(2009)
Comunicació de congrés
Accés restringit per política de l'editorialWe present a system developed for the CoNLL-2009 Shared Task (Hajic et al., 2009). We extend the Carreras (2007) parser to jointly annotate syntactic and semantic dependencies. This state-of-the-art parser factorizes the ... -
A second-order semi-lagrangian particle finite element method for fluid flows
(Springer, 2019-01-01)
Article
Accés obertIn this paper, a second-order SL-PFEM scheme for solving the incompressible Navier–Stokes equations is presented. This scheme is based on the second-order velocity Verlet algorithm, which uses an explicit integration for ... -
A second-order time accurate semi-implicit method for fluid–structure interaction problems
(2019-04-01)
Article
Accés obertThis paper is concerned with numerical solution of fluid-structure inter-action (FSI) problems involving an incompressible viscous flow and an elasticstructure. A semi-implicit partitioned method with second-order ... -
A section of the landscapes of the Mediterranean along the route of a thread of water: from the Pre-Pyrenees, inland, to the edges and coasts of delta de l'Ebre, Ribera del Xúquer, the Islands, and offshore to Venice
(LetteraVentidue, 2022-10-27)
Capítol de llibre
Accés restringit per política de l'editorialThis book is an open and potentially infinite interdisciplinary atlas of Mediterranean Routes: systems of material or immaterial relationships that somehow leave a trace in the landscape. The Open Atlas aims to put them ... -
A secure broadcast service for LDACS with an application to secure GBAS
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Text en actes de congrés
Accés obertThe VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and ... -
A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers
(Springer, 2015)
Capítol de llibre
Accés restringit per política de l'editorial -
A secure communication system based on a modified chaotic chua oscillator
(2014)
Comunicació de congrés
Accés obertIn this paper we propose a new scheme for secure communications us- ing a modified Chua oscillator. A modification of the oscillator is proposed in order to facilitate the decryption. The communication system requires two ... -
A secure dual-layer fault protection strategy for distribution network with DERs: enhancing security in the face of communication challenges
(Multidisciplinary Digital Publishing Institute (MDPI), 2024-02-01)
Article
Accés obertEarlier protection methods mainly focused on using communication channels to transmit trip signals between the protective devices (PDs), with no solutions provided in the case of communication failure. Therefore, this paper ... -
A secure JXTA-overlay platform for robot control
(Institute of Electrical and Electronics Engineers (IEEE), 2010)
Text en actes de congrés
Accés obertDue to the improvement of connections capabilities of end-devices there is an increasing interest to design and implement full featured P2P networks that integrate end-devices. In this paper, we use JXTA-Overlay for the ... -
A secure vault setup for a crypto wallet
(Universitat Politècnica de Catalunya, 2022-10-27)
Projecte Final de Màster Oficial
Accés obertIn today's digital world, every user needs to store sensitive data, including personal information, cryptographic keys and/or passwords. For user convenience, this data is usually backed up on a cloud hosting so that users ... -
A security framework for JXTA-overlay
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Text en actes de congrés
Accés obertAt present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ... -
A security model for randomization-based protected caches
(2022)
Article
Accés obertCache side-channel attacks allow adversaries to learn sensitive information about co-running processes by using only access latency measures and cache contention. This vulnerability has been shown to lead to several ... -
A security-aware approach to JXTA-overlay primitives
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Text en actes de congrés
Accés obertThe JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ...