In many applications in mobile robotics, it is important for a robot to explore its environment in order to construct a representation of space useful for guiding movement. We refe...
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Background: There are several isolated tools for partial analysis of microarray expression data. To provide an integrative, easy-to-use and automated toolkit for the analysis of A...
Gabriela G. Loots, Patrick S. G. Chain, Shalini Ma...
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...
Worldwide competition originated the development of Integrated E-Supply Chains (IESC) that are distributed manufacturing systems integrating international logistics and informatio...
Mariagrazia Dotoli, Maria Pia Fanti, Agostino Marc...