Today, three different physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a/b/g); they all provide multi-rate capabilities. To achieve a high performance under v...
Mathieu Lacage, Mohammad Hossein Manshaei, Thierry...
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
This paper introduces an approach to multi-perspective requirements engineering (PREview) which has been designed for industrial use and discusses our practical experience in appl...
In this paper, we employ the finite state machine (FSM) model for networks to investigate fault identification using passive testing. First, we introduce the concept of passive te...
Abstract— This paper presents a novel application of the twotime scale controller for the full envelop flight control of a Rotary wing Unmanned Aerial Vehicle (RUAV). In this pa...