Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Robust execution of robotic tasks is a difficult problem. In many situations, these tasks involve complex behaviors combining different functionalities (e.g. perception, localizat...
— This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision (EARA-QoS). This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infr...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
In this paper, a temperature-to-frequency transducer suitable for thermal monitoring on FPGAs is presented. The dependence between delay and temperature is used to produce a freque...