3D face recognition exploits shape information as well as texture information in 2D systems. The use of whole 3D face is sensitive to some undesired situations like expression var...
Abstract. Dialogue moves influence and are influenced by the agents’ preferences. We propose a method for modelling this interaction. We motivate and describe a recursive metho...
The program TRANALYZE generates a gate-level representation of an MOS transistor circuit. The resulting model contains only four-valued unit and zero delay logic primitives, suita...
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...