The misalignment of information systems (IS) components with the rest of an organization remains a critical and chronic unsolved problem in today's complex and turbulent worl...
We describe the web usage mining activities of an on-going project, called ClickWorld3 , that aims at extracting models of the navigational behaviour of a web site users. The model...
Miriam Baglioni, U. Ferrara, Andrea Romei, Salvato...
We describe the results of a set of evolutionary experiments in which a simulated robotic arm provided with a two-fingered hand has to reach and grasp objects with different shape...
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Abstract. When merging belief functions, Dempster rule of combination is justified only when sources can be considered as independent. When dependencies are ill-known, it is usual ...