Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
Abstract— We propose formal models for analyzing robustness of multi-hop control networks, where data from sensors to controllers and from controllers to actuators is sent throug...
Gera Weiss, Alessandro D'Innocenzo, Rajeev Alur, K...
In this work we prove the generic simplicity of the spectrum of the clamped plate equation in a bounded regular domain of Rd. That is, given Rd, we show that there exists an arbi...
—In this work, we study the effect of imperfect channel-state information (CSI) on the stability and delay of a two-user channel-aware slotted ALOHA system. We assume that the ch...
Shu-Hsien Wang, Chun-Kuang Lin, Yao-Win Peter Hong
— In this paper, we propose the concept of a ”mobile microscope”. This is a hand-held microscope that can be used for observation in various places. Because microscopes which...