In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
We have applied various visualization techniques to assist crime analysis. These techniques include a hierarchical list, a hyperbolic tree, a time line tool, a periodic pattern to...
Hsinchun Chen, Homa Atabakhsh, Tim Petersen, Jenni...
: Teleworking enables a more flexible scheduling of working time and places of work on the way to the modern information society. The rapid development of cooperative application s...
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Epileptic seizures are characterized by repetitive synchronous neuronal bursting activity. To study external influences on this activity, a simple model of a chain loop of neurona...
Pawel Kudela, Piotr J. Franaszczuk, Gregory K. Ber...