Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
A distributed adaptive algorithm to estimate a time-varying signal, measured by a wireless sensor network, is designed and analyzed. The presence of measurement noises and of packe...
Carlo Fischione, Alberto Speranzon, Karl Henrik Jo...
Background: Genome wide and cross species comparisons of amino acid repeats is an intriguing problem in biology mainly due to the highly polymorphic nature and diverse functions o...
Mridul K. Kalita, Gowthaman Ramasamy, Sekhar Durai...
In the nearly six decades since researchers began to explore methods of creating them, exoskeletons have progressed from the stuff of science fiction to nearly commercialized produ...
Recent progresses in ultra low power microelectronics propelled the development of several microsensors and particularly the self powered microsystems (SPMS). One of their limitat...
C. Jean-Mistral, S. Basrour, J. J. Chaillout, A. B...