Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
If the model of free-form queries, which has proved successful for HTML based search on the Web, is made available for Grid services, it will serve as a powerful tool for scientis...
—This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recogni...
Yanjun Yan, Rajani Muraleedharan, Xiang Ye, Lisa A...
Abstract— Underlay topology information is important to construct efficient overlay networks. To achieve end-to-end network topology inference among a group of hosts, traceroute...