Now showing items 21-22 of 22
Self-referential forces are sufficient to explain different dendritic morphologies
Dendritic morphology constrains brain activity, as it determines first which neuronal circuits are possible and second which dendritic computations can be performed over a neuron's inputs. It is known that a range of ...
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks
(University of York, 2013)
The decentralized administrative controlled-nature of mobile ad hoc networks (MANETs) presents security vulnerabilities which can lead to attacks such as malicious modification of packets. To enhance security in MANETs, ...