Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
The availability of semantically tagged corpora is becoming a very important and urgent need for training and evaluation within a large number of applications but also they are th...
Nicoletta Calzolari, Ornella Corazzari, Antonio Za...
We created paired moral dilemmas with minimal contrasts in wording, a research strategy that has been advocated as a way to empirically establish principles operative in a domain-...
This paper presents the author's experience in designing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some o...
— In this paper, a tetrahedral mobile robot with central axis for transformation to the flat vehicle is presented. The throwable robot with the function of going into narrow spac...