We propose a prototype for a real-world, human network proximity experiment with detailed recordings of the position of individuals. Our aim is to provide a comprehensive dataset t...
Matthew Stabeler, Davide Cellai, Simon Dobson, Pad...
We present sufficient conditions for robust relay-delayed semiglobal stabilization of second order systems, which relate the upper bound to an uncertain time delay and the paramete...
Eugenii Shustin, Leonid M. Fridman, Emilia Fridman...
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Synchronous design methods have intrinsic performance overheads due to their use of the global clock and timing assumptions. In future manufacturing processes not only may it beco...