In this paper, we describe a novel methodology that integrates the design of the (i) user interface; (ii) interaction logger; and (iii) log analyzer. It is based on formalizing, v...
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Due to the different nature of the available dynamic interactions between components afforded by some middleware infrastructure, distributed information systems (DIS) behave differ...
: In this paper, we propose a technique to design Fuzzy Inference Systems (FIS) of Mamdani type with transparency constraints. The technique is based on our Crisp Double Clustering...
Giovanna Castellano, Anna Maria Fanelli, Corrado M...
Given the great amount of data that are generated of the experiments to analyze information of extracted chemical fluids of the brain of a rodent, arises the necessity to design an...