—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Content-based image retrieval requires a natural image (e.g, a photo) as query, but the absence of such a query image is usually the reason for a search. An easy way to express the...
In random-access networks, such as the IEEE 802.11 network, different users may transmit their packets simultaneously, resulting in packet collisions. Traditionally, the collided p...
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environmen...
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...