Abstract. From the echoes of their vocalisations bats extract information about the positions of reflectors. To gain an understanding of how target position is translated into neu...
Bertrand Fontaine, Herbert Peremans, Benjamin Schr...
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
We devise and experiment with a dynamical kernel-based system for tracking hand movements from neural activity. The state of the system corresponds to the hand location, velocity,...
In this paper, we present a stochastic model for the dynamic fleet management problem with random travel times. Our approach decomposes the problem into time-staged subproblems by...
We consider the five-component Meinhardt-Gierer model for mutually exclusive patterns and segmentation which was proposed in [11]. We prove rigorous results on the existence and st...