— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Online social media applications have exploded in popularity in the Web. In most of these applications, users interact with other users and create content that becomes available o...
We study activity recognition using 104 hours of annotated data collected from a person living in an instrumented home. The home contained over 900 sensor inputs, including wired r...
Beth Logan, Jennifer Healey, Matthai Philipose, Em...
Exploiting the complex maze of publicly available Biological resources to implement scientific data collection pipelines poses a multitude of challenges to biologists in accurate...
There is still no standardization of software measures and metrics extraction tools have to be updated frequently to handle the changes. A possible solution is represented by usin...
Marco Scotto, Alberto Sillitti, Giancarlo Succi, T...