Login / Signup

Identity control, activity control: from trust to suspicion.

Meryem Marzouki
Published in: Ann. des Télécommunications (2007)
Keyphrases
  • control theory
  • information technology
  • control system
  • process control
  • real time
  • data mining
  • learning algorithm
  • artificial intelligence
  • multiscale
  • digital libraries
  • management system
  • control method