Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailH wie Heimat
Heimböckel, Dieter UL

Article for general public (2012)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailH-infinity Adaptive Observer Design and Parameter Identification for a Class of Nonlinear Fractional-Order Systems
N'Doye, Ibrahima; Voos, Holger UL; Laleg-Kirati, Taous-Meriem et al

in 53rd IEEE Conference Decision and Control, CDC’14, Los Angeles, USA, 15-17 Dec. 2014 (2014, December)

Detailed reference viewed: 41 (5 UL)
Full Text
Peer Reviewed
See detailH-infinity dynamic observer design for linear time invariant systems
Gao, Nan; Darouach, Mohamed; Voos, Holger UL et al

in 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), Los Angeles, USA (2014, December)

This paper proposes an H-infinity dynamic observer (DO) for a class of linear time invariant (LTI) systems in the presence of disturbances. It generalizes the existing results on the proportional observer ... [more ▼]

This paper proposes an H-infinity dynamic observer (DO) for a class of linear time invariant (LTI) systems in the presence of disturbances. It generalizes the existing results on the proportional observer (PO), the proportional integral observer (PIO) and the DO. The design method is derived from a new formulation of linear matrix inequality (LMI), based on the solutions of the algebraic constraints obtained from the unbiasedness conditions of the estimation error. A numerical example is provided to show the applicability and performances of our observer. [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailH-infinity Static Output Feedback Control for a Fractional-Order Glucose-Insulin System
Ndoye, Ibrahima UL; Voos, Holger UL; Darouach, Mohamed et al

in 6th Workshop on Fractional Differentiation and Its Applications. Part of 2013 IFAC Joint Conference SSSC, TDS and FDA (2013), Grenoble, February 4-6, 2013 (2013)

This paper presents the H-infinity static output feedback control of nonlinear fractional-order glucose-insulin systems. In this paper, it is an attempt to incorporate fractional-order into the ... [more ▼]

This paper presents the H-infinity static output feedback control of nonlinear fractional-order glucose-insulin systems. In this paper, it is an attempt to incorporate fractional-order into the mathematical minimal model of glucose-insulin system dynamics and it is still an interesting challenge to show, how the order of a fractional di erential system a ects the dynamics of system in the presence of meal disturbance. A static output feedback control is considered for the problem. Su fficient conditions are derived in terms of linear matrix inequalities (LMIs) formulation by using the fractional Lyapunov direct method where the fractional-order \alpha belongs to 0<\alpha<1. Finally, numerical simulations are carried out to illustrate our proposed results and show that the nonlinear fractional-order glucose-insulin systems are as stable as their integer-order counterpart in the presence of exogenous glucose infusion or meal disturbance. [less ▲]

Detailed reference viewed: 174 (7 UL)
Full Text
Peer Reviewed
See detailH2 Norm Based Network Volatility Measures
Huang, Qingqing; Yuan, Ye; Goncalves, Jorge UL et al

in The proceedings of the American Control Conference (2014)

Motivated by applications in biology and economics, we propose new volatility measures based on the H2 system norm for linear networks stimulated by independent or correlated noise. We identify critical ... [more ▼]

Motivated by applications in biology and economics, we propose new volatility measures based on the H2 system norm for linear networks stimulated by independent or correlated noise. We identify critical links in a network, where relatively small improvements can lead to large reductions in network volatility measures. We also examine volatility measures of individual nodes and their dependence on the topological position in the network. Finally, we investigate the dependence of the volatility on different network interconnections, weights of the edges and other network properties. Hence in an intuitive and efficient way, we can identify critical links, nodes and interconnections in network which can shed light in the network design to make it more robust. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
Peer Reviewed
See detailH2-Based Network Volatility Measures
Goncalves, Jorge UL; Huang, Qingqing; Yuan, Ye et al

in American Control Conference (2014, June)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailH_∞ decentralized dynamic-observer-based control design for large-scale nonlinear intercon-nected systems
Gao, Nan; Darouach, Mohamed; Alma, Marouane et al

in Transaction on IoT and Cloud Computing (2014), 2(3), 46-66

Detailed reference viewed: 35 (1 UL)
Full Text
See detailHabilitationsschrift „Prinzipien der kollektiven Vermögensanlage“
Zetzsche, Dirk Andreas UL

in Habilitationsschrift „Prinzipien der kollektiven Vermögensanlage“, 1004 S., Jus Privatum 192 (2015)

Rezensiert von Köndgen, AG 2015, 839; Freitag, NZG 2015, 1306; Kreisl, ZFR 2016, 49-50; Binder, ZVglRW 2016, 293-298; Opitz, Der Gesellschafter 2016, 37; Heidinger, RDW (A) 2016, 155; Hanten, ZBB 2016 ... [more ▼]

Rezensiert von Köndgen, AG 2015, 839; Freitag, NZG 2015, 1306; Kreisl, ZFR 2016, 49-50; Binder, ZVglRW 2016, 293-298; Opitz, Der Gesellschafter 2016, 37; Heidinger, RDW (A) 2016, 155; Hanten, ZBB 2016, 218-227. [less ▲]

Detailed reference viewed: 20 (5 UL)
See detailL'habitat collectif autogéré : choix ou contrainte ?
Hiez, David UL

Scientific Conference (2013)

Detailed reference viewed: 13 (1 UL)
Full Text
See detailHabiter par projets. Transformations urbaines et lieux de ville
Bricocoli, Massimo UL; Savoldi, Paola

in Berque, Augustin; De Biase, Alessia; Bonnin, Philippe (Eds.) Donner lieu au monde: la poétique de l'habiter (2012)

Detailed reference viewed: 22 (1 UL)
Full Text
See detailHachage vers les courbes elliptiques et cryptanalyse de schémas RSA
Tibouchi, Mehdi UL

Doctoral thesis (2011)

This thesis consists of two independent parts, devoted to both aspects of cryptology: construction and analysis. Contributions to cryptography proper, on the one hand, address open questions in algebraic ... [more ▼]

This thesis consists of two independent parts, devoted to both aspects of cryptology: construction and analysis. Contributions to cryptography proper, on the one hand, address open questions in algebraic curve-based cryptography, particularly the problem of encoding and hashing to elliptic curves. We derive some quantitative results on curve-valued encoding functions, and give a satisfactory construction of hash functions based on those encodings, using a range of mathematical techniques from function field arithmetic, the algebraic geometry of curves and surfaces, and character sums. We also worked on a more implementation-related problem in elliptic curve cryptography, namely the construction of fast addition and doubling formulas. Our cryptanalytic work, on the other hand, focuses on RSA-based cryptosystems—mostly encryption and signature schemes. We have obtained and carried out new attacks on standardized padding schemes that remain in widespread use, including ISO/IEC 9796-2 for signatures and PKCS#1 v1.5 for encryption. We also propose new physical fault attacks on RSA signature schemes using the Chinese Remainder Theorem, and a stronger attack on RSA schemes relying on small hidden-order subgroups. The tools involved include index calculus, lattice reduction techniques and efficient arithmetic of large degree polynomials. [less ▲]

Detailed reference viewed: 68 (4 UL)
See detail¿Hacia la firma de un acuerdo sectorial México-Unión Europea en materia de educación y formación?
Velasco Pufleau, Monica UL

in Huacuja Acevedo, Luis (Ed.) IX Reunión de la Comisión Parlamentaria Mixta México - Unión Europea: Cuaderno de Trabajo (2009)

Detailed reference viewed: 36 (2 UL)
Full Text
Peer Reviewed
See detailHacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points
Lanze, Fabian UL; Panchenko, Andriy UL; Ponce-Alcaide, Ignacio et al

in Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015) (2015)

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are ... [more ▼]

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are exposed to a severe security threat: since 802.11 identifiers (SSID, BSSID) can be easily faked, an attacker can setup an evil twin, i.e., an access point (AP) that users are unable to distinguish from a legitimate one. Once a user connects to the evil twin, he inadvertently creates a playground for various attacks such as collection of sensitive data (e.g., credit card information, passwords) or man-in-the-middle attacks even on encrypted traffic. It is particularly alarming that this security flaw has led to the development of several tools that are freely available, easy to use and allow mounting the attack from commodity client devices such as laptops, smartphones or tablets without attracting attention. In this paper we provide a detailed overview of tools that have been developed (or can be misused) to set up evil twin APs. We inspect them thoroughly in order to identify characteristics that allow them to be distinguished from legitimate hardware-based access points. Our analysis has discovered three methods for detecting software-based APs. These exploit accuracy flaws due to emulation of hardware behavior or peculiarities of the client Wi-Fi hardware they operate on. Our evaluation with 60 hardware APs and a variety of tools on different platforms reveals enormous potential for reliable detection. Furthermore, our methods can be performed on typical client hardware within a short period of time without even connecting to a potentially untrustworthy access point. [less ▲]

Detailed reference viewed: 127 (3 UL)
See detailHADOPI und DIGITAL ECONOMY ACT 2010: Zum Scheitern verurteilt?
Schmitz, Sandra UL

in Taeger, Jürgen (Ed.) Law as a Service (LaaS) - Recht im Internet- und Cloud-Zeitalter (2013)

Detailed reference viewed: 38 (11 UL)
See detailHalle-Neustadt - Ein Stadtteil mit Zukunft?
Steigleider, Sandra; Willems, Helmut UL

in Neustädter Nachrichten (2005)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailThe hallmarks of Parkinson's disease.
Antony, Paul UL; Diederich, Nico UL; Krüger, Rejko UL et al

in FEBS Journal (2013)

Since the discovery of dopamine as a neurotransmitter in the 1950s, Parkinson's disease (PD) research has generated a rich and complex body of knowledge, revealing PD to be an age-related multifactorial ... [more ▼]

Since the discovery of dopamine as a neurotransmitter in the 1950s, Parkinson's disease (PD) research has generated a rich and complex body of knowledge, revealing PD to be an age-related multifactorial disease, influenced by both genetic and environmental factors. The tremendous complexity of the disease is increased by a non-linear progression of the pathogenesis between molecular, cellular, and organic systems. In this mini-review, we explore the complexity of PD and propose a systems-based approach, organizing the available information around cellular disease hallmarks. We encourage our peers to adopt this cell-based view with the aim of improving communication in interdisciplinary research endeavors targeting the molecular events, modulatory cell-to-cell signaling pathways, and emerging clinical phenotypes related to PD. This article is protected by copyright. All rights reserved. [less ▲]

Detailed reference viewed: 210 (30 UL)
Peer Reviewed
See detailHamdan v Rumsfeld and the Law of War
Happold, Matthew UL

in Human Rights Law Review (2007), 7

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailHanbury Brown--Twiss Correlations and Noise in the Charge Transfer Statistics through a Multiterminal Kondo Dot
Schmidt, Thomas UL; Komnik, A.; Gogolin, A. O.

in Phys. Rev. Lett. (2007), 98

We analyze the charge transfer statistics through a quantum dot in the Kondo regime, when coupled to an arbitrary number of terminals N. Special attention is paid to current cross correlations between ... [more ▼]

We analyze the charge transfer statistics through a quantum dot in the Kondo regime, when coupled to an arbitrary number of terminals N. Special attention is paid to current cross correlations between concurring transport channels, which show distinct Hanbury Brown?Twiss antibunching for N>2 reflecting the fermionic nature of charge carriers. While this effect weakens as one moves away from the Kondo fixed point, a new type of correlations between nonconcurring channels emerges which are due entirely to the virtual polarization of the Kondo singlet. As these are not obscured by the background from fixed-point correlations they provide a promising means for extracting information on the parameters of the underlying Fermi-liquid model from the experimental data. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
See detailHandbook of Deontic logic and Normative Systems
Gabbay, Dov; Horty, Jeff; Parent, Xavier UL et al

Book published by College Publication (2013)

Detailed reference viewed: 63 (6 UL)