The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to study the issue of integral input-to-state stability (iISS) for hybrid dynamical systems (HDS). The notions of iIS-KLθ L Kθ K0-property and iIS-K Lθ-stability were proposed for HDS. The iIS-K Lθ L Kθ K0-property, including input-to-state stability (iISS) and iIS-K Lθ-stability, is a more general input-to-state property and reflects the specific effects on the dynamic behavior of...
In this paper, we propose a permutation-based code for the wiretap channel. We begin with an arbitrary channel code from Alice to Bob and then perform a series of permutations to enlarge the code to achieve secrecy to Eve. We show that the proposed code achieves the same performance as the traditional random code, in the sense that it achieves the random coding bound for the probability of decoding...
We study a two-transmitter two-receiver network where Receiver 1 can only hear the transmitted signal of Transmitter 1. Transmitter 1 has two messages, one of which is intended for Receiver 1 while both are intended for Receiver 2. Transmitter 2 has one message which is intended for Receiver 2. We call this channel model the Z channel with degraded message sets. When the multiple access link between...
Web-based Construction collaboration extranets (CCEs) are adopted for improving information management, communication and collaborative working in the construction industry. Previous studies have demonstrated their development, evolution and implementation. The benefits, barriers and success factors surrounding the use of CCEs are also discussed. However, although the general functionalities of CCEs...
In recent years, social behavioral data have been exponentially expanding due to the tremendous success of various outlets on the social Web (aka Web 2.0) such as Facebook, Digg, Twitter, Wikipedia, and Delicious. As a result, there's a need for social learning to support the discovery, analysis, and modeling of human social behavioral data. The goal is to discover social intelligence, which encompasses...
QQ, a kind of common IM (instant messaging) software, is becoming more and more popular in China. Although it has many advantages (such as convenience and security), there are many flaws as well, e.g. someone may use it to spread rumors, even do some illegal things. The aim of this paper is to record the QQ chats of all computers in the LAN, and monitor abnormal or illegal activities via QQ immediately...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.