Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
This paper presents a novel fault detection and section estimation method for unbalanced underground distribution systems (UDS). The method proposed is based on artificial neural n...
Karen Rezende Caino de Oliveira, Rodrigo Hartstein...
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...