— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...
We study the stability of two queueing delay-based congestion control algorithms, the (p, 1)-proportionally fair algorithm and the global optimization algorithm. We linearize the ...
This paper proposes a quadratic programming (QP) approach to robust model predictive control (MPC) for constrained linear systems having both model uncertainties and bounded distu...
— A wireless body area network with an average throughput of 500 kbps is considered based on ultra-wideband (UWB) pulse position modulation. For a long battery autonomy ultra low...