Gallery — Recent
A gallery of up-to-date and stylish LaTeX templates, examples to help you learn LaTeX, and papers and presentations published by our community. Search or browse below.

TH Köln 2017 Vorlage Abschlussarbeit Medieninformatik
Vorlage für TH Köln Abschlussarbeiten; insbesondere für StudentInnen der Medieninformatik
cgruenloh

Quellenverwaltung - BibTex
Was ist eine Quellenverwaltung (QV) und wie benutze ich speziell Bibtex-basierte QVs. Eine kleine Präsentation bezüglich dieses Themas.
Atomkernbeißer

Informes de laboratorio EIQ-UCR
Plantilla para informes de laboratorio tipo artículo de la Escuela de Ingeniería Química de la Universidad de Costa Rica
Esteban Richmond Salazar, Francisco Escobar

ANALYSIS OF FLIGHT-EFFICIENT ECOSYSTEM SOLUTIONS IN A MULTI-AIRCRAFT CONFLICT ENVIRONMENT
To accommodate future demands in air traffic management, this article qualitatively elaborates the multi-aircraft conflict resolution relying on the concept of an airborne ecosystem, as a set of autonomously operating aircraft whose trajectories are causally involved in a tactically detected conflict. The methodology provides two types of solutions: Air Traffic Control-based resolution that is considered as one from a set of compulsory avoidance maneuvers at a certain time instance, and the multi-agent simulated resolution as a product of the aircraft negotiation interactions and agreement on the avoidance maneuvers for the conflict state removal. The article further analyses a flight efficiency of the ecosystem resolution, in both distance and time, by comparing the compulsory against the negotiated solutions. From the total amount of tested trajectories and identified conflict patterns, three ecosystem scenarios have been randomly selected and efficiently quantified. Finally, the results have shown the significant savings in favor of the multi-agent solution approach.
Darryl Chan, Markov Radanovic

Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use.
In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd

Modelo_Resumo_IntroFis2017_03
Nome do Apresentador: Prof. Beltrano
Rodrigo Alves Dias

Microlattice: Un material innovador
Microlattice
Andrea Pinzon, Mariana Gil y Angela Pinto

Pêndulo Magnético
Faça um pêndulo leve com um pequeno ímã em sua extremidade. Um eletroímã adjacente conectado a uma fonte de corrente alternada de frequência muito superior à frequência natural do pêndulo pode levar a oscilações não-amortecidas com várias amplitudes. Estude e explique o fenômeno.
Gabriel Lefundes

UTFPR-PB-EE-Template para Trabalhos
Um template para acelerar a produção de trabalhos para o curso de Engenharia Elétrica da UTFPR campus Pato Branco
Lael Santos