In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
With the increasing popularity of wireless networks and mobile computing, data broadcasting has emerged as an efficient way of delivering data to mobile clients having a high degr...
Petros Nicopolitidis, Georgios I. Papadimitriou, M...
The synapse from the lateral pyloric (LP) to the pyloric dilator (PD) neuron in the stomatogastric nervous system of the crab Cancer borealis has both a graded and a spike-mediate...
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modelled with a simple integrate-and-fire process, whil...
Accurate minutiae extraction from fingerprint images is heavily dependent on the quality of the fingerprint images. In order to improve the performance of the system, much effort ...