Research on methods for detection and recognition of events and actions in videos is receiving an increasing attention from the scientific community, because of its relevance for ...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
The evolution from a disease-centered model of care to a more patient-centered model presents opportunities for going beyond designing technology to support medical professionals ...
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Graph-theoretic abstractions are extensively used to analyze massive data sets. Temporal data streams from socioeconomic interactions, social networking web sites, communication t...
Abstract. Protocols that govern the interactions between software components are a popular means to support the construction of correct component-based systems. Previous studies ha...