Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2016

A Control Technique for Operation of Single-Phase Converters in Stand-alone Operating Mode

Authors
Hosseini, SK; Mehrasa, M; Taheri, S; Rezanejad, M; Pouresmaeil, E; Catalao, JPS;

Publication
2016 IEEE ELECTRICAL POWER AND ENERGY CONFERENCE (EPEC)

Abstract
A droop-Lyapunov based control technique using direct-quadrature (d-q) rotating frame dynamic model is presented in this paper for the frequency and voltage magnitude regulation of a stand-alone single-phase voltage-source inverter (SPVSI). Steady-state and dynamic performance of the controller are analyzed based on the d-q frame model and direct Lyapunov method respectively to satisfy control aims and system stability as operation criteria. To further clarify the operation area of the inverter, positive and negative maximum values for d-q components of inverter current are acquired by introducing a capability curve (CC) for entire operating condition. The performance of the proposed control technique is evaluated numerically in the MATLAB/Simulink environment. The simulation results validate the capability of the proposed control method in both steady-state and transient responses.

2016

A Special-Purpose Language for Implementing Pipelined FPGA-Based Accelerators

Authors
de Oliveira, CB; Menotti, R; Cardoso, JMP; Marques, E;

Publication
LANGUAGES, DESIGN METHODS, AND TOOLS FOR ELECTRONIC SYSTEM DESIGN

Abstract

2016

Mistrustful P2P: Privacy-preserving File Sharing Over Untrustworthy Peer-to-Peer Networks

Authors
da Silva, PM; Dias, J; Ricardo, M;

Publication
2016 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS

Abstract
Peer-to-Peer networks are extensively used for largescale file sharing. As more information flows through these networks, people are becoming increasingly concerned about their privacy. Traditional P2P file sharing systems provide performance and scalability at the cost of requiring peers to publicly advertise what they download. Several P2P privacyenhancing systems have been proposed but they still require peers to advertise, either fully or partially, what they download. Lacking alternatives, users have adopted anonymity systems for P2P file sharing, misunderstanding the privacy guarantees provided by such systems, in particular when relaying traffic of insecure applications such as BitTorrent. Our goal is to prevent any malicious peer(s) from ascertaining users' content interests so that plausible deniability always applies. We propose a novel P2P file sharing model, Mistrustful P2P, that (1) supports file sharing over open and untrustworthy P2P networks, (2) requires no trust between users by avoiding the advertisement of what peers download or miss, and (3) still ensures deterministic protection of user's interests against attacks of size up to a configured privacy protection level. We hope that our model can pave the ground for a new generation of privacyenhancing systems that take advantage of the new possibilities it introduces. We validate Mistrustful P2P through simulation, and demonstrate its feasibility.

2016

Parsing and Reflective Printing, Bidirectionally

Authors
Zhu, ZR; Zhang, YZ; Ko, HS; Martins, P; Saraiva, J; Hu, ZJ;

Publication
PROCEEDINGS OF THE 2016 ACM SIGPLAN INTERNATIONAL CONFERENCE ON SOFTWARE LANGUAGE ENGINEERING (SLE'16)

Abstract
Language designers usually need to implement parsers and printers. Despite being two intimately related programs, in practice they are often designed separately, and then need to be revised and kept consistent as the language evolves. It will be more convenient if the parser and printer can be unified and developed in one single program, with their consistency guaranteed automatically. Furthermore, in certain scenarios (like showing compiler optimisation results to the programmer), it is desirable to have a more powerful reflective printer that, when an abstract syntax tree corresponding to a piece of program text is modified, can reflect the modification to the program text while preserving layouts, comments, and syntactic sugar. To address these needs, we propose a domain-specific language BIYACC, whose programs denote both a parser and a reflective printer for an unambiguous context-free grammar. BIYACC is based on the theory of bidirectional transformations, which helps to guarantee by construction that the pairs of parsers and reflective printers generated by BIYACC are consistent. We show that BIYACC is capable of facilitating many tasks such as Pombrio and Krishnamurthi's "resugaring", simple refactoring, and language evolution.

2016

Preface

Authors
Mernik, M; Leal, JP; Oliveira, HG;

Publication
OpenAccess Series in Informatics

Abstract

2016

Why Logical Clocks Are Easy

Authors
Baquero, C; Preguica, N;

Publication
COMMUNICATIONS OF THE ACM

Abstract

  • 2205
  • 4074