Sciweavers

448 search results - page 21 / 90
» Who is in Control
Sort
View
DFG
2009
Springer
15 years 10 months ago
Interactive Communication, Diagnosis and Error Control in Networks
s of the work of our research group are given in the following poster of the final meeting. Network Coding Network Coding has emerged as a new paradigm that has influenced Inform...
Rudolf Ahlswede, Harout K. Aydinian
ATAL
2008
Springer
15 years 6 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
ICASSP
2011
IEEE
14 years 7 months ago
Stationary Common Spatial Patterns: Towards robust classification of non-stationary EEG signals
Brain-Computer Interfaces (BCIs) allow a user to control a computer application by brain activity as acquired, e.g., by EEG. A standard step in a BCI system is to project the EEG ...
Wojciech Wojcikiewicz, Carmen Vidaurre, Motoaki Ka...
IH
1998
Springer
15 years 8 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
153
Voted
EKAW
2010
Springer
15 years 2 months ago
Social People-Tagging vs. Social Bookmark-Tagging
Abstract. Tagging has been widely used and studied in various domains. Recently, people-tagging has emerged as a means to categorize contacts, and is also used in some social acces...
Peyman Nasirifard, Sheila Kinsella, Krystian Samp,...