Sciweavers

3076 search results - page 506 / 616
» Active Learning for Networked Data
Sort
View
NDSS
2007
IEEE
15 years 11 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
151
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
Priority Based Power Saving Mode in WLAN
— According to employing Power Saving Mode (PSM) scheme or not, stations (STAs) in Wireless Local Area Networks can be classified into two categories: STAs using PSM (PSSTAs) an...
Fan Zhu, Zhisheng Niu
141
Voted
LCN
2008
IEEE
15 years 11 months ago
TCP mechanisms for improving the user experience for time-dependent thin-stream applications
—A wide range of Internet-based services that use reliable transport protocols display what we call thin-stream properties. This means that the application sends data with such a...
Andreas Petlund, Kristian Evensen, Carsten Griwodz...
ISNN
2010
Springer
15 years 7 months ago
Multi-modal EEG Online Visualization and Neuro-Feedback
Brain computer interface (BCI) is a communication pathway between brain and peripheral devices, which is promising in the field of rehabilitation and helps to improve the life qual...
Kan Hong, Liqing Zhang, Jie Li, Junhua Li
ISNN
2010
Springer
15 years 10 months ago
Applications of Second Order Blind Identification to High-Density EEG-Based Brain Imaging: A Review
In the context of relating specific brain functions to specific brain structures, second-order blind identification (SOBI) is one of the blind source separation algorithms that hav...
Akaysha Tang