Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
This paper addresses the problem of rate distortion analysis in the context of multi-view image coding, where images are predicted via disparity compensation based on depth map. W...
The research activity described in this paper concerns the personalisation process in e-learning contexts. Particular emphasis is laid on the mechanisms of user profiling and assoc...
Corrado Mencar, Ciro Castiello, Anna Maria Fanelli
Abstract. Temporal reference in natural language is inherently context dependent: what counts as a moment in one context may be structurally analysed in another context, and vice v...