A key step for the effective use of local image features (i.e., highly distinctive and robust features) for recognition or image matching is the appropriate grouping of feature ma...
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Models for the simulation of pedestrian dynamics and crowds of pedestrians have already been successfully applied to several scenarios and case studies, off-the-shelf simulators ca...
Lorenza Manenti, Sara Manzoni, Giuseppe Vizzari, K...
A common statistical model for paired comparisons is the Bradley-Terry model. This research re-parameterizes the Bradley-Terry model as a single-layer artificial neural network (A...
This paper proposes automated support for classifying reported software failures in order to facilitate prioritizing them and diagnosing their causes. A classification strategy is...
Andy Podgurski, David Leon, Patrick Francis, Wes M...