The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Load recovery is an important part of network reconfiguration that aims at reconfiguring a stable skeleton network and recovering electrical supply as quickly as possible following a blackout. Considering the load recovery strategy may affect a strategic decision for generator start-up and restoration path selection, it is necessary to comprehensively deal with above three aspects simultaneously,...
Existing access control strategies for Internet of Things cannot provide good flexibility, robustness or quick response. We propose an access control approach of finer granularity and techniques supporting bulk operation to make interaction in IoT more flexible. Also, a decentralized strategy and data centric network techniques are used to enhance the system robustness and swiftness. We implement...
Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. This paper studies the physical layer security (PLS) performance of a backscatter system which contains several relays and an eavesdropper. We discuss the conditions for a positive secrecy rate of the system in two different situations. First, in the case of known information of eavesdropper,...
Many real-time distributed computing (RTDC) applications have stringent action timing requirements as well as tight security-enforcement requirements. Integration of security enforcement mechanisms into advanced component-based RTDC schemes has been recognized as an important research topic in recent years. In this paper we propose the first formal extension of the Time-triggered Message-triggered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.