The performance of autonomous vehicles could be drastically improved if ad-hoc networking and suitable real-time coordination is employed to optimize and improve the joint behavio...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
This work presents a novel approach to filter synthesis on a field programmable analog array (FPAA) architecture using a genetic algorithm (GA). First, a Matlab model of the FPA...
Joachim Becker, Stanis Trendelenburg, Fabian Henri...
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
— One of the principal guidelines in the design of haptic devices is to provide a suitable mechanical design that can improve control performance and the force-feedback fidelity...
Simone Marcheschi, Antonio Frisoli, Carlo Alberto ...