Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
This article describes the isolated word recognizer presented by the authors to the ICDAR 2009 French handwriting recognition competition. This system is a combination of three is...
In the last few years, the growing complexity of the electrical power networks, mainly due to the increased use of electronic converters together with the requirements of a higher ...
Andrea Benigni, Gabriele D'Antona, U. Ghisla, Anto...
The rapid growth of the Web has increased the importance of decentralized metadata creation. Resource authors must create their own metadata to enable enhanced information seeking...
This paper examines the use of icons as communication devices in persistent conversations. The paper presents findings from the author’s ethnographic study of a fan group on Liv...