Applications typically have some local understanding of a database schema, a virtual database that may differ significantly from the actual schema of the data where it is stored...
James F. Terwilliger, Lois M. L. Delcambre, David ...
—This paper discusses and evaluates the role of shared control approach in a BCI-based telepresence framework. Driving a mobile device by using human brain signals might improve ...
Luca Tonin, Robert Leeb, Michele Tavella, Serafeim...
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
—The interference situation in the uplink of cellular networks, such as the 3GPP UTRAN Long Term Evolution (LTE), is usually highly volatile since from one transmission time inte...
The Texture Fragmentation and Reconstruction (TFR) algorithm has been recently introduced [9] to address the problem of image segmentation by textural properties, based on a suita...