Exploratory ad-hoc queries could return too many answers ? a phenomenon commonly referred to as "information overload". In this paper, we propose to automatically catego...
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
The aim of this work is to provide an elegant and accurate static execution timing model for 32-bit microprocessor instruction sets, covering also inter–instruction effects. Suc...
Giovanni Beltrame, Carlo Brandolese, William Forna...
In this paper, we re-examine the recently proposed distributed state estimators based on quantized innovations. It is widely believed that the error covariance of the Quantized In...
A common problem encountered in signboard recognition is the perspective distortion of characters. In this paper, we propose a method which is able to directly recognize character...