نتایج جستجو برای: depth of unobservability
تعداد نتایج: 21170537 فیلتر نتایج به سال:
Change History Draft v0.1 July 28, 2000 Andreas Pfitzmann, [email protected] Draft v0.2 Aug. 25, 2000 Marit Köhntopp, [email protected] Draft v0.3 Aug. 26-Sep. 01, 2000 Andreas Pfitzmann, Marit Köhntopp Draft v0.4 Sep. 13, 2000 Andreas Pfitzmann, Marit Köhntopp Changes in sections Anonymity, Unobservability, Pseudonymity Draft v0.5 Oct. 03, 2000 Adam Shostack, [email protected], An...
Finding minimum number of connecting lines is as important as locating power quality monitors (PQMs) for full observability of power system. Therefore, a PQM placement method should determine both optimum buses and lines, since utilities can make better decisions for monitoring of power system with this information. This paper attempted to propose a new method to locate the PQMs at various unob...
In India Power system monitoring is based mainly on measurements provided by Remote Terminal Unit (RTU). For power system measurement synchronized Phasor or Phasor Measurement Unit (PMU) is popular choice in abroad and its popularity is increasing day by day because of its several features. Direct measurement of voltage or current Phasor is possible because of PMU which was not possible earlier...
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes).
The paper is devoted to the problem of observability and controllability analysis in nonlinear dynamic systems. Both continuousand discrete-time systems described by nonlinear differential or difference equations, respectively, are considered. A new approach is developed to solve this problem whose features include (i) consideration of systems with non-differentiable nonlinearities and (ii) the...
-The paper considers the basic privacy requirements namely anonymity, pseudonimity, unlinkability and unobservability and how these requirements can be linked with related system implementation techniques thus guiding design decisions during system development.
مطالعه حاضر تلاشی است برای بررسی تأثیرات به کارگیری فرهنگ لغات ، یکی از مهمترین ابزارهای یادگیری واژگان درفراگیری زبان خارجی، بر روی دانش لغوی. دراین تحقیق فرهنگ های الکترونیکی در قیاس با فرهنگ های چاپی مورد بررسی قرارگرفته اند که آیا این فرهنگ ها تاثیرقابل توجهی بر روی دوبعد کمی و کیفی دانش لغوی یعنی عمق و گستره لغات می گذارند. همچنین مشخص گردیده است که آیا تفاوت قابل ملاحظه ای میان عمق و گستر...
Behavioural equivalences of various calculi for modelling distributed systems differ significantly because the properties which can be observed through interaction depend heavily upon their mode of communication. A typical approach to describing the semantics of communicating processes is to provide a labelled transition system (lts) which captures the interaction potential of the individual pr...
We present a formal model of Chaum’s Mix concept and apply known analysis techniques to a new type of security property, namely anonymity, in a network composed of senders, receivers and Mix stations. The network and its components are formalized as CSP processes, and combined with a (passive) attacker. Based on the model-checker FDR, formal analyses of networks and their security properties ar...
Since many web users have posted their opinions and information without revealing their personal identities (i.e. demographics, social standing, or expertise), anonymity has become a common form of exchanging information in online communities, such as social media, Internet forums, social networks, etc. In the meantime, negative social consequences due to malicious comments or identity deceptio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید