Ara es mostren els items 6679-6698 de 244456

    • A second opinion approach for speech recognition verification 

      Hernández-Ábrego, G; Mariño Acebal, José Bernardo (M,I, Torres & A. Sanfeliu / AERFAI, 1999)
      Text en actes de congrés
      Accés obert
      In order to improve the reliability of speech recognition results, a verifying system, that takes profit of the information given from an alternative recognition step is proposed. The alternative results are considered as ...
    • A second order cone formulation of continuous CTA model 

      Lesaja, Goran; Castro Pérez, Jordi; Oganian, Anna (Springer, 2016)
      Text en actes de congrés
      Accés obert
      In this paper we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statistical disclosure limitation (control) of tabular data. The goal of the CTA model is to find the closest safe table to some ...
    • A Second Order Expansion of the Separatrix Map for Trigonometric Perturbations of a Priori Unstable Systems 

      Guàrdia Munarriz, Marcel; Kaloshin, Vadim; Zhang, Jianlu (2016-11-01)
      Article
      Accés obert
      In this paper we study a so-called separatrix map introduced by Zaslavskii–Filonenko (Sov Phys JETP 27:851–857, 1968) and studied by Treschev (Physica D 116(1–2):21–43, 1998; J Nonlinear Sci 12(1):27–58, 2002), Piftankin ...
    • A Second-order delta-sigma control of dielectric charge for contactless capacitive MEMS 

      Gorreta Mariné, Sergio; Pons Nin, Joan; Blokhina, Elena; Domínguez Pumar, Manuel (2015-04-01)
      Article
      Accés obert
      This letter introduces a new second-order delta-sigma method for controlling the dielectric charge in contactless capacitive microelectromechanical systems. This method improves the one previously proposed by the authors, ...
    • A second-order distributed Trotter–Suzuki solver with a hybrid CPU–GPU kernel 

      Wittek, Peter; Cucchietti, Fernando (Elsevier, 2013-04)
      Article
      Accés obert
      The Trotter-Suzuki approximation leads to an efficient algorithm for solving the timedependent Schrödinger equation. Using existing highly optimized CPU and GPU kernels, we developed a distributed version of the algorithm ...
    • A second-order face-centred finite volume method for elliptic problems 

      Vieira, Luan M.; Giacomini, Matteo; Sevilla Cárdenas, Rubén; Huerta, Antonio (2020-01-01)
      Article
      Accés obert
      A second-order face-centred finite volume method (FCFV) is proposed. Contrary to the more popular cell-centred and vertex-centred finite volume (FV) techniques, the proposed method defines the solution on the faces of the ...
    • A second-order face-centred finite volume method on general meshes with automatic mesh adaptation 

      Giacomini, Matteo; Sevilla Cárdenas, Rubén (2020-01-01)
      Article
      Accés obert
      A second-order face-centred finite volume strategy on general meshes is pro-posed. The method uses a mixed formulation in which a constant approximationof the unknown is computed on the faces of the mesh. Such information ...
    • A second-order joint Eisner model for syntactic and semantic dependency parsing 

      Lluis Martorell, Xavier; Bott, Stefan Markus; Màrquez Villodre, Lluís (2009)
      Comunicació de congrés
      Accés restringit per política de l'editorial
      We present a system developed for the CoNLL-2009 Shared Task (Hajic et al., 2009). We extend the Carreras (2007) parser to jointly annotate syntactic and semantic dependencies. This state-of-the-art parser factorizes the ...
    • A second-order semi-lagrangian particle finite element method for fluid flows 

      Colom Cobb, Jonathan; García Espinosa, Julio; Serván Camas, Borja; Nadukandi, Prashanth (Springer, 2019-01-01)
      Article
      Accés obert
      In this paper, a second-order SL-PFEM scheme for solving the incompressible Navier–Stokes equations is presented. This scheme is based on the second-order velocity Verlet algorithm, which uses an explicit integration for ...
    • A second-order time accurate semi-implicit method for fluid–structure interaction problems 

      Naseri, Alireza; González Acedo, Ignacio; Amani, Ahmad; Pérez Segarra, Carlos David; Oliva Llena, Asensio (2019-04-01)
      Article
      Accés obert
      This paper is concerned with numerical solution of fluid-structure inter-action (FSI) problems involving an incompressible viscous flow and an elasticstructure. A semi-implicit partitioned method with second-order ...
    • A section of the landscapes of the Mediterranean along the route of a thread of water: from the Pre-Pyrenees, inland, to the edges and coasts of delta de l'Ebre, Ribera del Xúquer, the Islands, and offshore to Venice 

      Llop Torné, Carles Joan; Maldonado Moreno, Josep; Milà, Gemma; Sisó Almirall, Ramón; Tudela, Artur (LetteraVentidue, 2022-10-27)
      Capítol de llibre
      Accés restringit per política de l'editorial
      This book is an open and potentially infinite interdisciplinary atlas of Mediterranean Routes: systems of material or immaterial relationships that somehow leave a trace in the landscape. The Open Atlas aims to put them ...
    • A secure broadcast service for LDACS with an application to secure GBAS 

      Maurer, Nils; Caamaño Albuerne, María; Gerbeth, Daniel; Graupl, Thomas; Schmitt, Corinna (Institute of Electrical and Electronics Engineers (IEEE), 2021)
      Text en actes de congrés
      Accés obert
      The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and ...
    • A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers 

      Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (Springer, 2015)
      Capítol de llibre
      Accés restringit per política de l'editorial
    • A secure communication system based on a modified chaotic chua oscillator 

      Zapateiro, Mauricio; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (2014)
      Comunicació de congrés
      Accés obert
      In this paper we propose a new scheme for secure communications us- ing a modified Chua oscillator. A modification of the oscillator is proposed in order to facilitate the decryption. The communication system requires two ...
    • A secure dual-layer fault protection strategy for distribution network with DERs: enhancing security in the face of communication challenges 

      Al Hanaineh, Wael Hasan Ahmad; Matas Alcalá, José; Guerrero Zapata, Josep Maria; Bakkar, Mostafa (Multidisciplinary Digital Publishing Institute (MDPI), 2024-02-01)
      Article
      Accés obert
      Earlier protection methods mainly focused on using communication channels to transmit trip signals between the protective devices (PDs), with no solutions provided in the case of communication failure. Therefore, this paper ...
    • A secure JXTA-overlay platform for robot control 

      Spaho, Evjola; Matsuo, Keita; Barolli, Leonard; Arnedo Moreno, Joan; Xhafa Xhafa, Fatos; Kolici, Vladi (Institute of Electrical and Electronics Engineers (IEEE), 2010)
      Text en actes de congrés
      Accés obert
      Due to the improvement of connections capabilities of end-devices there is an increasing interest to design and implement full featured P2P networks that integrate end-devices. In this paper, we use JXTA-Overlay for the ...
    • A secure vault setup for a crypto wallet 

      Ruiz Alcalá, Alexis (Universitat Politècnica de Catalunya, 2022-10-27)
      Projecte Final de Màster Oficial
      Accés obert
      In today's digital world, every user needs to store sensitive data, including personal information, cryptographic keys and/or passwords. For user convenience, this data is usually backed up on a cloud hosting so that users ...
    • A security framework for JXTA-overlay 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Text en actes de congrés
      Accés obert
      At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ...
    • A security model for randomization-based protected caches 

      Ribes González, Jordi; Farràs Ventura, Oriol; Hernández Luz, Carles; Kostalabros, Vatistas; Moretó Planas, Miquel (2022)
      Article
      Accés obert
      Cache side-channel attacks allow adversaries to learn sensitive information about co-running processes by using only access latency measures and cache contention. This vulnerability has been shown to lead to several ...
    • A security-aware approach to JXTA-overlay primitives 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Text en actes de congrés
      Accés obert
      The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ...