In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
We have developed a novel and simple mathematical model of a slow excitatory postsynaptic potential ased on an abstraction of the processes of activation, inactivation, and summati...
P. P. Bertrand, E. A. Thomas, W. A. A. Kunze, J. C...
As software comes under increasing scrutiny for its lack of safety and reliability, numerous static and partially dynamic tools (including model checking) have been proposed for v...
— We consider a discrete-time dynamical system with Boolean and continuous states, with the continuous state propagating linearly in the continuous and Boolean state variables, a...
Argyris Zymnis, Stephen P. Boyd, Dimitry M. Gorine...
Social factors, such as status differences, may prevent some members from participating in group decisions. Computerized group decision support systems (GDSSs) can reduce social i...
John Davis, Melora Zaner, Shelly Farnham, Cezary M...