Probabilistic verification techniques have been applied to the formal modelling and analysis of a wide range of systems, from communication protocols such as Bluetooth, to nanosca...
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Concurrently with fast development of location aware technologies, many applications have been developing to exploit location data for serving people. However, a main challenge in...
Abstract. We report on the nonlinear analysis of electroencephalogram (EEG) recordings in the rabbit visual cortex. Epileptic seizures were induced by local penicillin application ...
J. Sarnthein, Henry D. I. Abarbanel, H. Pockberger