Results 11 to 20 of about 14,849 (145)

Integrity protection for code-on-demand mobile agents in e-commerce [PDF]

open access: yes, 2002
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core   +1 more source

Synthesis and thermoelectric properties of noble metal ternary chalcogenide systems of Ag-Au-Se in the forms of alloyed nanoparticles and colloidal nanoheterostructures [PDF]

open access: yes, 2016
The optimization of a material functionality requires both the rational design and precise engineering of its structural and chemical parameters. In this work, we show how colloidal chemistry is an excellent synthetic choice for the synthesis of novel ...
Albert Figuerola (1544470)   +14 more
core   +3 more sources

Stability and $\ell^2$-gain Analysis of Adaptive Control Systems with Event-triggered Try-once-discard Protocols

open access: yes, 2018
This paper addresses the stability and $\ell^2$-gain analysis of adaptive control systems with event-triggered try-once-discard protocols. At every sampling time, an event trigger evaluates an error between the current value and the last released value ...
Wakaiki, Masashi
core   +1 more source

Time4: Time for SDN [PDF]

open access: yes, 2016
With the rise of Software Defined Networks (SDN), there is growing interest in dynamic and centralized traffic engineering, where decisions about forwarding paths are taken dynamically from a network-wide perspective.
Mizrahi, Tal, Moses, Yoram
core   +1 more source

A log mining approach for process monitoring in SCADA [PDF]

open access: yes, 2012
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano   +2 more
core   +4 more sources

State Estimation for Measurement-Saturated Memristive Neural Networks with Missing Measurements and Mixed Time Delays Subject to Cyber-Attacks: A Non-Fragile Set-Membership Filtering Framework

open access: yesApplied Sciences
This paper is concerned with the state estimation problem based on non-fragile set-membership filtering for a class of measurement-saturated memristive neural networks (MNNs) with unknown but bounded (UBB) noises, mixed time delays and missing ...
Ziyang Wang   +4 more
doaj   +1 more source

Networked control systems in the presence of scheduling protocols and communication delays

open access: yes, 2014
This paper develops the time-delay approach to Networked Control Systems (NCSs) in the presence of variable transmission delays, sampling intervals and communication constraints. The system sensor nodes are supposed to be distributed over a network.
Fridman, Emilia   +2 more
core   +4 more sources

Confronting combined cyber-attacks on collaborative DC microgrids using a communication protocols-based distributed unscented Kalman filter

open access: yesFranklin Open
The functioning of microgrids (MGs), which represent a contemporary arrangement of distribution networks featuring local control over generation and consumption, necessitates telecommunication infrastructure for transmitting and receiving measurement ...
Seyyed Mohammad Hosseini Rostami   +2 more
doaj   +1 more source

Set-membership filtering for time-varying systems with mixed time-delays under Round-Robin and Weighted Try-Once-Discard protocols [PDF]

open access: yesAutomatica, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zou, L, Wang, Z, Gao, H
openaire   +4 more sources

Protocol-based set-membership state estimation for linear repetitive processes with uniform quantization: a zonotope-based approach

open access: yesComplex & Intelligent Systems
This paper is concerned with the zonotopic state estimation problem for a class of linear repetitive processes (LRPs) with weighted try-once-discard protocols (WTODPs) subject to uniform quantization.
Minghao Gao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy