To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
With the fast adoption of IP-based communications for mobile computing, users are expecting a similar service in wireless and wired networks. This raises the need for setting guar...
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
We address two issues in Evolutionary Robotics, namely the genetic encoding and the performance criterion, also known as fitness function. For the first aspect, we suggest to enco...
Nonlinear model predictive control (MPC) of a simulated chaotic cutting process is presented. The nonlinear MPC combines a neural-network model and a genetic-algorithm-based optim...