Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Abstract. Although ASP systems have been extended in many directions, they still miss features which may be helpful towards industrial applications, like capabilities of quickly in...
Francesco Calimeri, Giovambattista Ianni, Giuseppe...
We propose a frame structure that is augmented with belief functions to model knowledge in a spoken dialog system. In addition we propose methods to combine belief functions in the...
Abstract. Segmentation of magnetic resonance imaging (MRI) data entails assigning tissue class labels to voxels. The primary source of segmentation error is the partial volume eff...
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...