The numerical Laplace transform: An accurate technique for analyzing electromagnetic transients on power system devices Fulltext Access 8 Pages 2009
Exploiting selective instruction reuse and value prediction in a superscalar architecture Fulltext Access 8 Pages 2009
Probabilistic evaluation of reserve requirements of generating systems with renewable power sources: The Portuguese and Spanish cases Fulltext Access 8 Pages 2009
Automatic generation control of TCPS based hydrothermal system under open market scenario: A fuzzy logic approach Fulltext Access 8 Pages 2009
Applying inherent capabilities of quantum-dot cellular automata to design: D flip-flop case study Fulltext Access 8 Pages 2009
Exploiting an abstract-machine-based framework in the design of a Java ILP processor Fulltext Access 8 Pages 2009
Computation of TCSC reactance and suggesting criterion of its location for ATC improvement Fulltext Access 8 Pages 2009
A wireless embedded tongue tactile biofeedback system for balance control Fulltext Access 8 Pages 2009
Electricity transmission pricing: Tracing based point-of-connection tariff Fulltext Access 8 Pages 2009
UPFC control parameter identification for effective power oscillation damping Fulltext Access 8 Pages 2009
A two-stage planning and control model toward Economically Adapted Power Distribution Systems using analytical hierarchy processes and fuzzy optimization Fulltext Access 8 Pages 2009
The relation of requirements uncertainty and stakeholder perception gaps to project management performance Fulltext Access 8 Pages 2009
A reversible information hiding scheme using left–right and up–down chinese character representation Fulltext Access 8 Pages 2009
On finding minimum cost tree for multi-resource manycast in mesh networks Fulltext Access 8 Pages 2009
A new method for digital encoder adaptive velocity/acceleration evaluation using a TDC with picosecond accuracy Fulltext Access 8 Pages 2009
Application of wavelets and Prony method for disturbance detection in fixed speed wind farms Fulltext Access 8 Pages 2009
Design of a high performance architecture for real-time enhancement of video stream captured in extremely low lighting environment Fulltext Access 8 Pages 2009
Probabilistic load flow with wind production uncertainty using cumulants and Cornish–Fisher expansion Fulltext Access 8 Pages 2009
Fault location for underground distribution feeders: An extended impedance-based formulation with capacitive current compensation Fulltext Access 8 Pages 2009
Engaging the net generation with evidence-based software engineering through a community-driven web database Fulltext Access 8 Pages 2009
A grid operation model: Resource demand for an adequate incident management in high-, medium-, and low-voltage grids Fulltext Access 8 Pages 2009
The persistence of memory: Forensic identification and extraction of cryptographic keys Fulltext Access 9 Pages 2009
DEX: Digital evidence provenance supporting reproducibility and comparison Fulltext Access 9 Pages 2009
Configurable symbol synchronizers for software-defined radio applications Fulltext Access 9 Pages 2009
Detecting rogue access points using client-side bottleneck bandwidth analysis Fulltext Access 9 Pages 2009
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard Fulltext Access 9 Pages 2009
Security architecture for virtual organizations of business web services Fulltext Access 9 Pages 2009
Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server Fulltext Access 9 Pages 2009
Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application Fulltext Access 9 Pages 2009
Particle swarm optimization with time varying acceleration coefficients for non-convex economic power dispatch Fulltext Access 9 Pages 2009
Evaluation of the variations of short-circuit capacities along a feeder due to distribution system-type upgrading Fulltext Access 9 Pages 2009
Parameters tuning of power system stabilizers using improved ant direction hybrid differential evolution Fulltext Access 9 Pages 2009
Technical and economic impacts of active management on distribution network Fulltext Access 9 Pages 2009
Hybrid evolutionary algorithms in a SVR-based electric load forecasting model Fulltext Access 9 Pages 2009
Evolutionary algorithm solution and KKT based optimality verification to multi-area economic dispatch Fulltext Access 9 Pages 2009
Prediction of hottest spot temperature in power transformer windings with non-directed and directed oil-forced cooling Fulltext Access 9 Pages 2009
Multilevel turbo coded–continuous phase frequency shift keying (MLTC–CPFSK) Fulltext Access 9 Pages 2009
Assessment of oscillatory stability constrained available transfer capability Fulltext Access 9 Pages 2009
An artist life cycle model for digital media content: Strategies for the Light Web and the Dark Web Fulltext Access 9 Pages 2009
E-service quality competition through personalization under consumer privacy concerns Fulltext Access 9 Pages 2009
The 2007 procurement challenge: A competition to evaluate mixed procurement strategies Fulltext Access 9 Pages 2009
Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection Fulltext Access 9 Pages 2009
Critical infrastructure dependency assessment using the input–output inoperability model Fulltext Access 9 Pages 2009
Determining the mobile commerce user requirements using an analytic approach Fulltext Access 9 Pages 2009
More efficient systolic arrays for multiplication in GF (2m2m) using LSB first algorithm with irreducible polynomials and trinomials Fulltext Access 9 Pages 2009
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Fulltext Access 9 Pages 2009
Generating routing table for free roaming mobile agent in distributed environment Fulltext Access 9 Pages 2009
Roaming across wireless local area networks using SIM-based authentication protocol Fulltext Access 9 Pages 2009
Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T) Fulltext Access 9 Pages 2009
USIM-based EAP-TLS authentication protocol for wireless local area networks Fulltext Access 9 Pages 2009
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol Fulltext Access 9 Pages 2009
Simplified software inspection process in compliance with international standards Fulltext Access 9 Pages 2009
The implementation guidance for practicing network isolation by referring to ISO-17799 standard Fulltext Access 9 Pages 2009
Design and analysis of a highly secure stream cipher based on linear feedback shift register Fulltext Access 9 Pages 2009
Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation Fulltext Access 9 Pages 2009