To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
The design of an embedded control system starts with an investigation of properties and behaviors of the process evolving within its environment, and an analysis of the requiremen...
Hai H. Wang, Shengchao Qin, Jun Sun 0001, Jin Song...
—Ultra-wideband (UWB) has emerged as an exciting technology for short range, high data rate wireless personal area networks (WPAN) applications. The multiband orthogonal frequenc...
Antoine Stephan, Jean-Yves Baudais, Jean-Fran&cced...
— A low complexity frequency domain iterative decision-directed channel estimation (FD-IDDCE) technique for single-carrier (SC) systems with frequency domain multiplexed (FDM) pi...
Chan-Tong Lam, David D. Falconer, Florence Danilo-...
Abstract-In this paper, a Q-learning-based hybrid automatic repeat request (Q-HARQ) scheme is proposed to achieve efficient resource utilization for high speed downlink packet acc...