Recently, a novel and structural representation of speech was proposed [1, 2], where the inevitable acoustic variations caused by nonlinguistic factors are effectively removed fro...
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
In group-living animals, aggregation favours interactions and information exchanges between individuals, and thus allows the emergence of complex collective behaviors. In previous ...
This paper investigates the effects of two different communication protocols within an artificial society, where communication and cooperation is necessary to survive. Communicat...
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...