Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
We consider the problem of retrieving multiple documents relevant to the single subtopics of a given web query, termed “full-subtopic retrieval”. To solve this problem we pres...
Andrea Bernardini, Claudio Carpineto, Massimiliano...
A system built in terms of autonomous agents may require even greater correctness assurance than one which is merely reacting to the immediate control of its users. Agents make su...
Cu D. Nguyen, Anna Perini, Paolo Tonella, Simon Mi...
Abstract. Substitution matrices are at the heart of Bioinformatics: sequence alignment, database search, phylogenetic inference, protein family classication are based on Blosum, P...
Stephan Kitchovitch, Yuedong Song, Richard C. van ...
Flash light of digital cameras is a very useful way to picture scenes with low quality illumination. Nevertheless, especially low-end cameras integrated flash lights are considere...
Matteo Dellepiane, Marco Callieri, Massimiliano Co...