The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
— High-gain PID position control, which is widely used with industrial robots, involves some risks in cases of abnormal events, such as unexpected environment contacts and tempor...
— Though modern operating systems have a capable of controlling the power consumption using the DVFS (Dynamic Voltage and Frequency Scaling) mechanism, it is controlled for some ...
— Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the n...
Abstract--In this paper, we investigate the problem of optimizing the lifetime of a mobile ad hoc network at a given degree k of connectivity by minimizing power consumption. Our p...