Sciweavers

128
Voted
TIM
2016
51views Education» more  TIM 2016»
9 years 11 months ago
Performance Assessment of Linear State Estimators Using Synchrophasor Measurements
—This paper aims to assess the performance of linear state estimation (SE) processes of power systems relying on synchrophasor measurements. The performance assessment is conduct...
Styliani Sarri, Lorenzo Zanni, Miroslav Popovic, J...
TIIS
2016
76views more  TIIS 2016»
9 years 11 months ago
The MovieLens Datasets: History and Context
F. Maxwell Harper, Joseph A. Konstan
TII
2016
48views more  TII 2016»
9 years 11 months ago
Virtual Power Plant for Grid Services Using IEC 61850
— This paper assesses the communication, information and functional requirements of Virtual Power Plants (VPPs). A conceptual formulation of the interoperability requirements is ...
Nicholas Etherden, Valeriy Vyatkin, Math H. J. Bol...
TII
2016
47views more  TII 2016»
9 years 11 months ago
A New TRNG Based on Coherent Sampling With Self-Timed Rings
—Random numbers play a key role in applications such as industrial simulations, laboratory experimentation, computer games, and engineering problem solving. The design of new Tru...
Honorio Martín, Pedro Peris-Lopez, Juan E. ...
55
Voted
TIFS
2016
75views more  TIFS 2016»
9 years 11 months ago
Detectability of the Order of Operations: An Information Theoretic Approach
Abstract—As it is more and more convenient to manipulate multimedia content, the authenticity of multimedia content becomes questionable. While there are many forensic techniques...
Xiaoyu Chu, Yan Chen, K. J. Ray Liu
TIFS
2016
66views more  TIFS 2016»
9 years 11 months ago
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
—Spectrum security and enforcement is one of the major challenges that need to be addressed before spectrum sharing technologies can be adopted widely. The problem of rogue trans...
Vireshwar Kumar, Jung-Min "Jerry" Park, Kaigui Bia...
TIFS
2016
76views more  TIFS 2016»
9 years 11 months ago
Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
—This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In ...
Yansha Deng, Lifeng Wang, Maged Elkashlan, Arumuga...
TIFS
2016
72views more  TIFS 2016»
9 years 11 months ago
Information Theory and the IrisCode
—Iris recognition has legendary resistance to False Matches, and the tools of information theory can help to explain why. The concept of entropy is fundamental to understanding b...
John Daugman
TIFS
2016
76views more  TIFS 2016»
9 years 11 months ago
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
—Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired...
Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian ...
TIFS
2016
58views more  TIFS 2016»
9 years 11 months ago
Content-Adaptive Steganography by Minimizing Statistical Detectability
Abstract—Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated empirically using ...
Vahid Sedighi, Rémi Cogranne, Jessica J. Fr...