Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Abstract This paper investigates simple and robust transparency-attainable control architectures for bilateral teleoperation. The strength of two-channel control architectures and ...
We address in this paper the problem of scheduling for multiprocessor real-time systems with hard and soft tasks. Utility functions are associated to soft tasks to capture their r...
We present sufficient conditions for robust relay-delayed semiglobal stabilization of second order systems, which relate the upper bound to an uncertain time delay and the paramete...
Eugenii Shustin, Leonid M. Fridman, Emilia Fridman...
—The frequency hopping (FH) based ultra-wideband (UWB) communication system divides its available frequency spectrum into several sub-bands, which leads to inherent disparities b...
Jin Man Kwon, Ye Hoon Lee, Nam-Soo Kim, HwangSoo L...