This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
In this paper, we propose a novel segmenting system for ultrasound images. This solution is separated into three steps. First, we filter noise by using the “peakand-valley” wi...
Nualsawat Hiransakolwong, Piotr S. Windyga, Kien A...
Abstract--A conventional transmitted reference (TR) modulation scheme is an effective means to combat severe multipath distortion in an ultra-wideband (UWB) system, significantly r...
This paper is on the design of robust output feedback integral control for minimum-phase nonlinear systems with a well-defined relative degree. Previous work has shown how to desi...