The focus of this paper is to design a spur gear using an S-shaped transition curve where certain conditions need to be fulfilled such as curvature continuity, shaped parameter etc...
Saifudin Hafiz Yahaya, Jamaludin Md Ali, Muhammad ...
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
A goal of computing and networking systems is to limit administrative requirements for users and operators. A technical systems should be able to configure itself as much as possi...
The challenge of verifying a modern microprocessor design is an overwhelming one: Increasingly complex micro-architectures combined with heavy time-to-market pressure have forced ...
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...