Sciweavers

899 search results - page 8 / 180
» On Wiretap Networks II
Sort
View
CN
2007
71views more  CN 2007»
14 years 11 months ago
Medium access control in wireless sensor networks
Kurtis B. Kredo II, Prasant Mohapatra
91
Voted
IJCNN
2006
IEEE
15 years 5 months ago
An Interval Type-II Robust Fuzzy Logic Controller for a Static Compensator in a Multimachine Power System
—This paper presents a novel fuzzy logic based controller for a Static Compensator (STATCOM) connected to a power system. Type-II fuzzy systems are selected that enable the contr...
Salman Mohagheghi, Ganesh K. Venayagamoorthy, Rona...
CODES
2010
IEEE
14 years 9 months ago
Exploring models of computation with ptolemy II
The Ptolemy project studies modeling, simulation, and design of concurrent, real-time, embedded systems. The focus is on assembly of concurrent components. The key underlying prin...
Christopher X. Brooks, Edward A. Lee, Stavros Trip...
ISDA
2006
IEEE
15 years 5 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
ICNP
2002
IEEE
15 years 4 months ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong