—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
— The state-of-the-art in control of hand prosthetics is far from optimal. The main control interface is represented by surface electromyography (EMG): the activation potentials ...
Francesco Orabona, Claudio Castellini, Barbara Cap...
Dependence analysis underpins many activities in software maintenance such as comprehension and impact analysis. As a result, dependence has been studied widely for programming la...
Kelly Androutsopoulos, Nicolas Gold, Mark Harman, ...
While many computer tutoring systems have long been delivered as desktop applications, these systems have only recently begun to appear on mobile devices. In this work we apply pri...
Quincy Brown, Dario D. Salvucci, Frank J. Lee, Vin...
The emergence of scale free and small world properties in real world complex networks has stimulated lots of activity in the field of network analysis. An example of such a netwo...