Data acquisition in power systems and its digital processing for measurement and automation Fulltext Access 7 Pages 2005
Using P2P sharing activity to improve business decision making: proof of concept for estimating product life-cycle Fulltext Access 7 Pages 2005
Computerized recognition of Alzheimer disease-EEG using genetic algorithms and neural network Fulltext Access 7 Pages 2005
Oh behave! Agent-based behavioral representations in problem solving environments Fulltext Access 7 Pages 2005
Biological sequence alignment on the computational grid using the GrADS framework Fulltext Access 7 Pages 2005
An ID-based multisignature scheme without reblocking and predetermined signing order Fulltext Access 7 Pages 2005
Modeling, specification and verification of ad-hoc sensor networks using SPIN Fulltext Access 7 Pages 2005
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme Fulltext Access 7 Pages 2005
Next-generation intrusion prevention: Accounting for the attack timeline Fulltext Access 7 Pages 2005
Tracking USB storage: Analysis of windows artifacts generated by USB storage devices Fulltext Access 7 Pages 2005
Case study: Network intrusion investigation - lessons in forensic preparation Fulltext Access 7 Pages 2005
An assessment of systems and software engineering scholars and institutions (1999-2003) Fulltext Access 7 Pages 2005
Automated support for service-based software development and integration Fulltext Access 7 Pages 2005
Performance of different simple linearizing techniques in SiGe LNA at 1900 MHz Fulltext Access 7 Pages 2005
IEC class 0.5 electronic watt-hour meter implemented with first-order sigma-delta converters Fulltext Access 7 Pages 2005
The Laws of Vulnerabilities: Which security vulnerabilities really matter? Fulltext Access 7 Pages 2005
A new method for adaptive IIR filter design based on tabu search algorithm Fulltext Access 7 Pages 2005
A simple generalized neuro-fuzzy operator for efficient removal of impulse noise from highly corrupted digital images Fulltext Access 7 Pages 2005
Fuzzy logic controller in interconnected electrical power systems for load-frequency control Fulltext Access 8 Pages 2005
Temperature-independent fiber Bragg grating strain sensor using bimetal cantilever Fulltext Access 8 Pages 2005
A Petri-net based distributed monitoring system using PIC microcontrollers Fulltext Access 8 Pages 2005
Methods of discovery and exploitation of Host Protected Areas on IDE storage devices that conform to ATAPI-4 Fulltext Access 8 Pages 2005
Utilization of time varying event-based customer interruption cost load shedding schemes Fulltext Access 8 Pages 2005
A modified hybrid EP-SQP approach for dynamic dispatch with valve-point effect Fulltext Access 8 Pages 2005
Transfer of transient surge voltage through XLPE cable winding transformer (Dryformer) circuits Fulltext Access 8 Pages 2005
Matching optical fiber lifetime and bend-loss limits for optimized local loop fiber storage Fulltext Access 8 Pages 2005
Tunable dispersion compensation with fixed center wavelength and bandwidth using a side-polished linearly chirped fiber Bragg grating Fulltext Access 8 Pages 2005
40Â Gbit/s packet bit error ratio and loss real-time measurement for ultrahigh-speed packet switched network Fulltext Access 8 Pages 2005
Software requirement understanding using Pathfinder networks: discovering and evaluating mental models Fulltext Access 8 Pages 2005
Developing and using a web-based project process throughout the software engineering curriculum Fulltext Access 8 Pages 2005
An empirical investigation of the impact of the object-oriented paradigm on the maintainability of real-world mission-critical software Fulltext Access 8 Pages 2005
On-line prediction of software reliability using an evolutionary connectionist model Fulltext Access 8 Pages 2005
Towards modeling and evaluation of ETCS real-time communication and operation Fulltext Access 8 Pages 2005
Scheduling of cogeneration plants considering electricity wheeling using enhanced immune algorithm Fulltext Access 8 Pages 2005
The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education Fulltext Access 8 Pages 2005
Incorporation of middleware and grid technologies to enhance usability in Computational Chemistry applications Fulltext Access 8 Pages 2005
Application of Grid-enabled technologies for solving optimization problems in data-driven reservoir studies Fulltext Access 8 Pages 2005
Automatic differentiation and nonlinear controller design by exact linearization Fulltext Access 8 Pages 2005
Looking for narrow interfaces in automatic differentiation using graph drawing Fulltext Access 8 Pages 2005
Frequency domain transient analysis of electrical networks including non-linear conditions Fulltext Access 8 Pages 2005
Identification of synchronous generators using adaptive wavelet networks Fulltext Access 8 Pages 2005
On centralized power pool auction: a novel multipliers stabilization procedure Fulltext Access 8 Pages 2005
Dealing with packet loss in the Interactive Chained Stream Authentication protocol Fulltext Access 8 Pages 2005
Ancillary reactive power service allocation cost in deregulated markets: a methodology Fulltext Access 8 Pages 2005
A power system control scheme based on security visualisation in parameter space Fulltext Access 8 Pages 2005