-
1
-
-
65949086009
-
Warming caused by cumulative carbon emissions towards the trillionth tonne
-
Apr.
-
M. R. Allen et al., "Warming Caused by Cumulative Carbon Emissions Towards the Trillionth Tonne," Nature, vol. 458, Apr. 2009, pp. 1163-66.
-
(2009)
Nature
, vol.458
, pp. 1163-1166
-
-
Allen, M.R.1
-
2
-
-
84864876690
-
-
U.S. Environment Protection Agency, Sep.
-
U.S. Environment Protection Agency, Sep. 2010, http://www.epa.gov/otaq/ climate/basicinfo.htm#2.
-
(2010)
-
-
-
3
-
-
82155167643
-
Energy-efficient security algorithm for power gride wide area monitoring system
-
Nov.
-
M. Qiu et al., "Energy-Efficient Security Algorithm for Power Gride Wide Area Monitoring System," IEEE Trans. Smart Grid, vol. 2, no. 4, Nov. 2011, pp. 715-23.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 715-723
-
-
Qiu, M.1
-
4
-
-
65849231067
-
Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
-
Article 25, Apr. 2009;ACM TODAES 2011 Best Paper Award
-
M. Qiu and E. H.-M. Sha, "Cost Minimization While Satisfying Hard/Soft Timing Constraints for Heterogeneous Embedded Systems," ACM Trans. Design Automation of Electronic Systems, vol. 14, no. 2, Article 25, Apr. 2009;ACM TODAES 2011 Best Paper Award, pp. 1-30.
-
ACM Trans. Design Automation of Electronic Systems
, vol.14
, Issue.2
, pp. 1-30
-
-
Qiu, M.1
Sha, E.H.-M.2
-
5
-
-
84860849234
-
Balance of security strength and energy for a pmu monitoring system in smart grid
-
May
-
M. Qiu et al., "Balance of Security Strength and Energy for a PMU Monitoring System in Smart Grid," IEEE Commun. Mag., vol. 50, no. 5, May 2012, pp. 142-49.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 142-149
-
-
Qiu, M.1
-
6
-
-
70350378277
-
Recognizing the use-mode of kitchen appliances from their current consumption
-
G. Bauer, K. Stockinger, and P. Lukowicz, "Recognizing the Use-Mode of Kitchen Appliances from Their Current Consumption," Proc. EuroSSC, 2009, pp. 163-76.
-
(2009)
Proc. EuroSSC
, pp. 163-176
-
-
Bauer, G.1
Stockinger, K.2
Lukowicz, P.3
-
7
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. MOBICOM, 2009, pp. 321-332.
-
(2009)
Proc. MOBICOM
, pp. 321-332
-
-
Jana, S.1
-
8
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Q. Wang et al., "Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks," Proc. INFOCOM, 2011, pp. 1422-30.
-
(2011)
Proc. INFOCOM
, pp. 1422-1430
-
-
Wang, Q.1
-
9
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi et al., "Robust Key Generation from Signal Envelopes in Wireless Networks," ACM Proc. Computer and Commun. Security, 2007, pp. 401-10.
-
(2007)
ACM Proc. Computer and Commun. Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
-
10
-
-
58149117462
-
On myopic sensing for multi-channel opportunistic access: Structure, optimality, and performance
-
Q. Zhao, B. Krishnamachari, and K. Liu, "On Myopic Sensing for Multi-Channel Opportunistic Access: Structure, Optimality, and Performance," IEEE Trans. Wireless Commun., vol. 7, no. 12-2, 2008, pp. 5431-40.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.12-22
, pp. 5431-5440
-
-
Zhao, Q.1
Krishnamachari, B.2
Liu, K.3
-
11
-
-
35948943542
-
The on-line shortest path problem under partial monitoring
-
A. György et al., "The Online Shortest Path Problem Under Partial Monitoring," J. Machine Learning Research, vol. 8, 2007, pp. 2369-03. (Pubitemid 350064071)
-
(2007)
Journal of Machine Learning Research
, vol.8
, pp. 2369-2403
-
-
Gyorgy, A.1
Linder, T.2
Lugosi, G.3
Ottucsak, G.4
|