In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
This paper deals with hierarchical model predictive control (MPC) of distributed systems. A threelevel hierarchical approach is proposed, consisting of a high level MPC controller,...
Jan Dimon Bendtsen, Klaus Trangbaek, Jakob Stoustr...
In Smart Spaces (SSs), the capability of learning from experience is fundamental for autonomous adaptation to environmental changes and for proactive interaction with users. New re...
Alessio Dore, Andrea F. Cattoni, Carlo S. Regazzon...
Tetralogy of Fallot (ToF) is a severe congenital heart disease that mainly affects the right ventricle (RV). It requires surgical repair early in infancy. Chronic regurgitations ma...
Tommaso Mansi, Stanley Durrleman, Boris Bernhardt,...
– In this paper we present three efficient DVS techniques for an MPEG decoder. Their energy reduction is comparable to that of the optimal solution. A workload prediction model i...