Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Modern day applications require use of multi-processor systems for reasons of scalability and power efficiency. As more and more applications are integrated on a single device, m...
Akash Kumar, Bart Mesman, Henk Corporaal, Jef L. v...
—We address joint estimation of frequency offsets and channel responses in OFDMA uplink. A cyclically equal-spaced, equal-energy interleaved pilot preamble is proposed by which t...
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
—Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human whose phys...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...