With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
— According to employing Power Saving Mode (PSM) scheme or not, stations (STAs) in Wireless Local Area Networks can be classified into two categories: STAs using PSM (PSSTAs) an...
—A wide range of Internet-based services that use reliable transport protocols display what we call thin-stream properties. This means that the application sends data with such a...
Andreas Petlund, Kristian Evensen, Carsten Griwodz...
Brain computer interface (BCI) is a communication pathway between brain and peripheral devices, which is promising in the field of rehabilitation and helps to improve the life qual...
In the context of relating specific brain functions to specific brain structures, second-order blind identification (SOBI) is one of the blind source separation algorithms that hav...