Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Two different systems are proposed for the task of capitalisation generation. The first system is a slightly modified speech recogniser. In this system, every word in the vocabula...
Abstract. Bridging the gap between the specification of software requirements and actual execution of the behavior of the specified system has been the target of much research in r...
There is a growing interest for techniques and tools facilitating the testing of mobile systems. The movement of nodes is one of the relevant factors of context change in ubiquito...
Antonia Bertolino, Guglielmo De Angelis, Francesca...
This paper describes a method for learner modelling for use within simulation-based learning environments. The goal of the learner modelling system is to provide the learner with a...