The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Incentive based demand response (IBDR) offers one of the more promising opportunities for engineering sustainable electricity services. While there are a wide range of studies representing the potential of IBDR program in the power market, understanding customer response needs further study. A key component in all demand response (DR) programs' design is the elasticity which implies customer reaction...
With the rapid adoption of Internet and wireless technology, the demand for a faster and reliable speed has been dramatically increasing. Identifying influential factors in consumers wireless technology adoption and willingness to pay for a faster Internet speed across various settings has been an important and focal interest in wireless communication for both researchers and practitioners. By using...
The widely deployed Virtual Private Network (VPN) technology allows roaming users to build an encrypted tunnel to a VPN server, which, henceforth, allows roaming users to access some resources as if that computer were residing on their home organization's network. Although VPN technology is very useful, it imposes security threats on the remote network because its firewall does not know what traffic...
In this paper, we propose a new approach for the dynamic detection of malicious executables on the platform of Windows. Our approach extracts signatures of malicious executable's behaviors by using API (Application Program Interface) interception technique which makes possible the detection of unknown malicious executables. The dynamic detection of unknown malicious executables is achieved in three...
Instead of all using commodity components, an approach building a personal parallel computer on top of a non-coherent HyperTransport (HT) fabric is presented in the paper. The advantage is to provide both lower cost and higher performance compared with the existing method. A HT switch is designed and implemented for the interconnection of a set of AMD Opteron processors for building an in-a-box cluster...
Computer games are widely applied in the field of education. The games can be used for improving learning motivation and effectiveness, especially for the students who encounter difficulties or feel uninteresting in learning. Combined with a quiz database established by nature science specialists, the system uses an online game platform suitable for elementary school students to assist them study...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.