—The opening of under-utilized spectrum creates the opportunity of substantial performance improvement through cognitive radio techniques. However, the real network performance m...
—Data collection is one of the major traffic pattern in wireless sensor networks, which requires regular source nodes to send data packets to a common sink node with limited end...
This work addresses the problem of information leakage of cryptographic devices, by using the reconfiguration technique allied to an RNS based arithmetic. The information leaked b...
This paper presents a new teleoperation scheme for mobile manipulation systems. A virtual spring connects a master and slave system where local force feedback on the slave system c...
This paper proposes a new second order sliding mode output feedback controller. This latter is developped in the case of finite sampling frequency and is using only output informa...