This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
—In this paper we address the problem of traffic grooming in WDM rings with all-to-all and its generalization to many-to-many service by using network coding. We consider minimi...
— Reliable and efficient operation of power networks is of paramount importance. In this paper we explore communication architectures that leverage Phasor Measurement Units (PMU...
Shrut Kirti, Zhifang Wang, Anna Scaglione, Robert ...
Abstract—Traditional Dijkstra and Bellman-Ford routing algorithms can only provide the best route to each destination based on a fixed link cost model. We propose a utility-base...