This paper illustrates a method and a toolset for quality evaluation of Web applications that exploits conceptual specifications, deriving from the adoption of model-based develop...
Pier Luca Lanzi, Maristella Matera, Andrea Maurino
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from...
Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wall...
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
The goal of this article is to simulate rotating flows of shallow layers of fluid by means of finite volume numerical schemes. More precisely, we focus on the simulation of the geo...
Graph-based image analysis methods are increasingly being applied to diffusion MRI (dMRI) analysis. Unfortunately, weighting the graph for these methods involves solving a complex...