When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
In this paper we present some analysis techniques and indexing strategies aimed to support classification and retrieval of textures using only perceptual features. The goal of thi...
Sebastiano Battiato, Giovanni Gallo, Salvatore Nic...
In this work we present the computational algorithm that combines perceptual and cognitive information during the visual search for object features. The algorithm is initially driv...
Monitoring the changes in data values obtained from the environment (e.g., locations of moving objects) is a primary concern in many fields, as for example in the pervasive comput...