Software developers, designers and researchers have been looking to technology for solutions to help and educate people with autism for over two decades. There are many examples o...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Face recognition algorithms typically deal with the classification of static images of faces that are obtained using a camera. In this paper we propose a new sensing mechanism bas...
The likely advent of AGI and the long-established trend of improving computational hardware promise a dual revolution in coming decades: machines which are both more intelligent an...
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...