—Using CDMA technology, one has to contend with interference in frequency-selective channels caused by multipath propagation and fading. Transmitter-based methods such as Zero Fo...
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
We study the secrecy capacity of the frequency-selective wiretap channel. Assuming that a guard interval of L symbols is inserted to avoid the inter-block interference and these s...
Abstract— This paper proposes a novel framework to generate optimal passive gait trajectories for a planar one-legged hopping robot via iterative learning control. The proposed m...