This paper centres on the problem of estimating the location of features in the environment within a map building framework for a mobile robot with a single camera. Most of the ex...
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
In this work we want to put in evidence the necessity to integrate theoretical, methodological and didactical aspects with innovative e-learning systems, in order to hypothesize po...