نتایج جستجو برای: depth of unobservability

تعداد نتایج: 21170537  

2004
Andreas Pfitzmann Marit Köhntopp

Change History Draft v0.1 July 28, 2000 Andreas Pfitzmann, [email protected] Draft v0.2 Aug. 25, 2000 Marit Köhntopp, [email protected] Draft v0.3 Aug. 26-Sep. 01, 2000 Andreas Pfitzmann, Marit Köhntopp Draft v0.4 Sep. 13, 2000 Andreas Pfitzmann, Marit Köhntopp Changes in sections Anonymity, Unobservability, Pseudonymity Draft v0.5 Oct. 03, 2000 Adam Shostack, [email protected], An...

Finding minimum number of connecting lines is as important as locating power quality monitors (PQMs) for full observability of power system. Therefore, a PQM placement method should determine both optimum buses and lines, since utilities can make better decisions for monitoring of power system with this information. This paper attempted to propose a new method to locate the PQMs at various unob...

2016
S Bhongade

In India Power system monitoring is based mainly on measurements provided by Remote Terminal Unit (RTU). For power system measurement synchronized Phasor or Phasor Measurement Unit (PMU) is popular choice in abroad and its popularity is increasing day by day because of its several features. Direct measurement of voltage or current Phasor is possible because of PMU which was not possible earlier...

2000
Andreas Pfitzmann Marit Köhntopp

Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes).

Journal: :Applied Mathematics and Computer Science 2012
Alexey N. Zhirabok Alexey Ye. Shumsky

The paper is devoted to the problem of observability and controllability analysis in nonlinear dynamic systems. Both continuousand discrete-time systems described by nonlinear differential or difference equations, respectively, are considered. A new approach is developed to solve this problem whose features include (i) consideration of systems with non-differentiable nonlinearities and (ii) the...

2005
Evangelia Kavakli Christos Kalloniatis Stefanos Gritzalis

-The paper considers the basic privacy requirements namely anonymity, pseudonimity, unlinkability and unobservability and how these requirements can be linked with related system implementation techniques thus guiding design decisions during system development.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1388

مطالعه حاضر تلاشی است برای بررسی تأثیرات به کارگیری فرهنگ لغات ، یکی از مهمترین ابزارهای یادگیری واژگان درفراگیری زبان خارجی، بر روی دانش لغوی. دراین تحقیق فرهنگ های الکترونیکی در قیاس با فرهنگ های چاپی مورد بررسی قرارگرفته اند که آیا این فرهنگ ها تاثیرقابل توجهی بر روی دوبعد کمی و کیفی دانش لغوی یعنی عمق و گستره لغات می گذارند. همچنین مشخص گردیده است که آیا تفاوت قابل ملاحظه ای میان عمق و گستر...

Journal: :Electr. Notes Theor. Comput. Sci. 2009
Julian Rathke Pawel Sobocinski

Behavioural equivalences of various calculi for modelling distributed systems differ significantly because the properties which can be observed through interaction depend heavily upon their mode of communication. A typical approach to describing the semantics of communicating processes is to provide a labelled transition system (lts) which captures the interaction potential of the individual pr...

2002
Burkhart Wolff Oliver Berthold Sebastian Clauß Hannes Federrath Stefan Köpsell Andreas Pfitzmann

We present a formal model of Chaum’s Mix concept and apply known analysis techniques to a new type of security property, namely anonymity, in a network composed of senders, receivers and Mix stations. The network and its components are formalized as CSP processes, and combined with a (passive) attacker. Based on the model-checker FDR, formal analyses of networks and their security properties ar...

2013
Ho Lee Jaewon Choi Kyung Kyu Kim

Since many web users have posted their opinions and information without revealing their personal identities (i.e. demographics, social standing, or expertise), anonymity has become a common form of exchanging information in online communities, such as social media, Internet forums, social networks, etc. In the meantime, negative social consequences due to malicious comments or identity deceptio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید