Login / Signup
Identity control, activity control: from trust to suspicion.
Meryem Marzouki
Published in:
Ann. des Télécommunications (2007)
Keyphrases
</>
control theory
information technology
control system
process control
real time
data mining
learning algorithm
artificial intelligence
multiscale
digital libraries
management system
control method