The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
In the analysis of natural images, Gaussian scale mixtures (GSM) have been used to account for the statistics of filter responses, and to inspire hierarchical cortical representat...
Odelia Schwartz, Terrence J. Sejnowski, Peter Daya...
The trends of miniaturization and increasing storage capabilities for portable music players made it possible to carry increasingly more music on small portable devices, but it al...
Fabio Vignoli, Rob van Gulik, Huub van de Wetering