A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
Abstract— We study the problem of designing control strategies for nondeterministic transitions systems enforcing the satisfaction of Linear Temporal Logic (LTL) formulas over th...
This paper focuses on peer-to-peer storage systems that achieve availability through replication. We study the problem of resource allocation when the system must replicate multip...
There exist various narrative systems, focused on different parts of the complex process of story generation. Some of them are oriented to content planning, and some other to sent...
Abstract. This paper presents a visual particle filter for jointly tracking the position of a person and her head pose. The resulting information may be used to support automatic ...