The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
A number of problems frequently encountered in brain image analysis can be conveniently solved within a registration framework, such as alignment of mono- or multi-sequence Magnet...
Engagement is an important aspect of effective learning. Time spent using an e-Learning system is not quality time if the learner is not engaged. Tracking student disengagement wou...
Functional verification is one of the major bottlenecks in microprocessor design. Simulation-based techniques are the most widely used form of processor verification. Efficient ...
Social and intentional behaviours appear as two main components of the agent paradigm. Methods of conventional software engineering do not seem to be appropriate to gain a full kno...